diff --git a/docs/AdvisoryGenericEOL.md b/docs/AdvisoryGenericEOL.md new file mode 100644 index 00000000..6367a1ff --- /dev/null +++ b/docs/AdvisoryGenericEOL.md @@ -0,0 +1,32 @@ +# AdvisoryGenericEOL + +advisory.GenericEOL + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**core** | [**AdvisoryGenericEOLCore**](AdvisoryGenericEOLCore.md) | | [optional] +**product** | [**AdvisoryGenericEOLProduct**](AdvisoryGenericEOLProduct.md) | | [optional] +**vc_info** | [**AdvisoryGenericEOLVCInfo**](AdvisoryGenericEOLVCInfo.md) | | [optional] + +## Example + +```python +from vulncheck_sdk.models.advisory_generic_eol import AdvisoryGenericEOL + +# TODO update the JSON string below +json = "{}" +# create an instance of AdvisoryGenericEOL from a JSON string +advisory_generic_eol_instance = AdvisoryGenericEOL.from_json(json) +# print the JSON string representation of the object +print(AdvisoryGenericEOL.to_json()) + +# convert the object into a dict +advisory_generic_eol_dict = advisory_generic_eol_instance.to_dict() +# create an instance of AdvisoryGenericEOL from a dict +advisory_generic_eol_from_dict = AdvisoryGenericEOL.from_dict(advisory_generic_eol_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AdvisoryGenericEOLCore.md b/docs/AdvisoryGenericEOLCore.md new file mode 100644 index 00000000..e5b0dec7 --- /dev/null +++ b/docs/AdvisoryGenericEOLCore.md @@ -0,0 +1,33 @@ +# AdvisoryGenericEOLCore + +advisory.GenericEOLCore + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**end_of_life** | **str** | | [optional] +**end_of_sales** | **str** | | [optional] +**end_of_security_support** | **str** | | [optional] +**last_updated** | **str** | | [optional] + +## Example + +```python +from vulncheck_sdk.models.advisory_generic_eol_core import AdvisoryGenericEOLCore + +# TODO update the JSON string below +json = "{}" +# create an instance of AdvisoryGenericEOLCore from a JSON string +advisory_generic_eol_core_instance = AdvisoryGenericEOLCore.from_json(json) +# print the JSON string representation of the object +print(AdvisoryGenericEOLCore.to_json()) + +# convert the object into a dict +advisory_generic_eol_core_dict = advisory_generic_eol_core_instance.to_dict() +# create an instance of AdvisoryGenericEOLCore from a dict +advisory_generic_eol_core_from_dict = AdvisoryGenericEOLCore.from_dict(advisory_generic_eol_core_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AdvisoryGenericEOLProduct.md b/docs/AdvisoryGenericEOLProduct.md new file mode 100644 index 00000000..bc00c86c --- /dev/null +++ b/docs/AdvisoryGenericEOLProduct.md @@ -0,0 +1,32 @@ +# AdvisoryGenericEOLProduct + +advisory.GenericEOLProduct + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**product_name** | **str** | | [optional] +**product_version** | **str** | | [optional] +**vendor_name** | **str** | | [optional] + +## Example + +```python +from vulncheck_sdk.models.advisory_generic_eol_product import AdvisoryGenericEOLProduct + +# TODO update the JSON string below +json = "{}" +# create an instance of AdvisoryGenericEOLProduct from a JSON string +advisory_generic_eol_product_instance = AdvisoryGenericEOLProduct.from_json(json) +# print the JSON string representation of the object +print(AdvisoryGenericEOLProduct.to_json()) + +# convert the object into a dict +advisory_generic_eol_product_dict = advisory_generic_eol_product_instance.to_dict() +# create an instance of AdvisoryGenericEOLProduct from a dict +advisory_generic_eol_product_from_dict = AdvisoryGenericEOLProduct.from_dict(advisory_generic_eol_product_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AdvisoryGenericEOLReference.md b/docs/AdvisoryGenericEOLReference.md new file mode 100644 index 00000000..dbfda37e --- /dev/null +++ b/docs/AdvisoryGenericEOLReference.md @@ -0,0 +1,31 @@ +# AdvisoryGenericEOLReference + +advisory.GenericEOLReference + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**description** | **str** | | [optional] +**url** | **str** | | [optional] + +## Example + +```python +from vulncheck_sdk.models.advisory_generic_eol_reference import AdvisoryGenericEOLReference + +# TODO update the JSON string below +json = "{}" +# create an instance of AdvisoryGenericEOLReference from a JSON string +advisory_generic_eol_reference_instance = AdvisoryGenericEOLReference.from_json(json) +# print the JSON string representation of the object +print(AdvisoryGenericEOLReference.to_json()) + +# convert the object into a dict +advisory_generic_eol_reference_dict = advisory_generic_eol_reference_instance.to_dict() +# create an instance of AdvisoryGenericEOLReference from a dict +advisory_generic_eol_reference_from_dict = AdvisoryGenericEOLReference.from_dict(advisory_generic_eol_reference_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AdvisoryGenericEOLVCInfo.md b/docs/AdvisoryGenericEOLVCInfo.md new file mode 100644 index 00000000..60b94c48 --- /dev/null +++ b/docs/AdvisoryGenericEOLVCInfo.md @@ -0,0 +1,35 @@ +# AdvisoryGenericEOLVCInfo + +advisory.GenericEOLVCInfo + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**cve** | **List[str]** | | [optional] +**date_added** | **str** | | [optional] +**references** | [**List[AdvisoryGenericEOLReference]**](AdvisoryGenericEOLReference.md) | | [optional] +**replacement** | [**AdvisoryGenericEOLProduct**](AdvisoryGenericEOLProduct.md) | | [optional] +**updated_at** | **str** | | [optional] +**version** | **str** | | [optional] + +## Example + +```python +from vulncheck_sdk.models.advisory_generic_eolvc_info import AdvisoryGenericEOLVCInfo + +# TODO update the JSON string below +json = "{}" +# create an instance of AdvisoryGenericEOLVCInfo from a JSON string +advisory_generic_eolvc_info_instance = AdvisoryGenericEOLVCInfo.from_json(json) +# print the JSON string representation of the object +print(AdvisoryGenericEOLVCInfo.to_json()) + +# convert the object into a dict +advisory_generic_eolvc_info_dict = advisory_generic_eolvc_info_instance.to_dict() +# create an instance of AdvisoryGenericEOLVCInfo from a dict +advisory_generic_eolvc_info_from_dict = AdvisoryGenericEOLVCInfo.from_dict(advisory_generic_eolvc_info_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AdvisoryJFrog.md b/docs/AdvisoryJFrog.md index 92eb606d..cac2f396 100644 --- a/docs/AdvisoryJFrog.md +++ b/docs/AdvisoryJFrog.md @@ -12,6 +12,7 @@ Name | Type | Description | Notes **product** | **str** | | [optional] **severity** | **str** | | [optional] **summary** | **str** | | [optional] +**updated_at** | **str** | | [optional] **url** | **str** | | [optional] **versions** | **List[str]** | | [optional] diff --git a/docs/IndicesApi.md b/docs/IndicesApi.md index 52c67ed5..6806dfba 100644 --- a/docs/IndicesApi.md +++ b/docs/IndicesApi.md @@ -322,6 +322,7 @@ Method | HTTP request | Description [**index_nz_advisories_get**](IndicesApi.md#index_nz_advisories_get) | **GET** /v3/index/nz-advisories | Return vulnerability data stored in index \"nz-advisories\" [**index_octopus_deploy_get**](IndicesApi.md#index_octopus_deploy_get) | **GET** /v3/index/octopus-deploy | Return vulnerability data stored in index \"octopus-deploy\" [**index_okta_get**](IndicesApi.md#index_okta_get) | **GET** /v3/index/okta | Return vulnerability data stored in index \"okta\" +[**index_omron_eol_get**](IndicesApi.md#index_omron_eol_get) | **GET** /v3/index/omron-eol | Return vulnerability data stored in index \"omron-eol\" [**index_omron_get**](IndicesApi.md#index_omron_get) | **GET** /v3/index/omron | Return vulnerability data stored in index \"omron\" [**index_one_e_get**](IndicesApi.md#index_one_e_get) | **GET** /v3/index/one-e | Return vulnerability data stored in index \"one-e\" [**index_opam_get**](IndicesApi.md#index_opam_get) | **GET** /v3/index/opam | Return vulnerability data stored in index \"opam\" @@ -485,6 +486,7 @@ Method | HTTP request | Description [**index_yokogawa_get**](IndicesApi.md#index_yokogawa_get) | **GET** /v3/index/yokogawa | Return vulnerability data stored in index \"yokogawa\" [**index_yubico_get**](IndicesApi.md#index_yubico_get) | **GET** /v3/index/yubico | Return vulnerability data stored in index \"yubico\" [**index_zdi_get**](IndicesApi.md#index_zdi_get) | **GET** /v3/index/zdi | Return vulnerability data stored in index \"zdi\" +[**index_zebra_eol_get**](IndicesApi.md#index_zebra_eol_get) | **GET** /v3/index/zebra-eol | Return vulnerability data stored in index \"zebra-eol\" [**index_zebra_get**](IndicesApi.md#index_zebra_get) | **GET** /v3/index/zebra | Return vulnerability data stored in index \"zebra\" [**index_zeroscience_get**](IndicesApi.md#index_zeroscience_get) | **GET** /v3/index/zeroscience | Return vulnerability data stored in index \"zeroscience\" [**index_zimbra_get**](IndicesApi.md#index_zimbra_get) | **GET** /v3/index/zimbra | Return vulnerability data stored in index \"zimbra\" @@ -44418,6 +44420,144 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **index_omron_eol_get** +> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination index_omron_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + +Return vulnerability data stored in index \"omron-eol\" + +### Overview +This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \ +By default, a maximum of 100 documents are shown per page. + +**Index Description:** Omron End of Life Notices + +### Paging Over Large Data (cursor) +In order to allow users to iterate over large index datasets, this endpoint provides a server-side +"cursor" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will +have a `next_cursor` id that clients will need to pass as a query parameter to the next request like +`GET /index/omron-eol?cursor=` + + +### Example + +* Api Key Authentication (Bearer): + +```python +import vulncheck_sdk +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination +from vulncheck_sdk.rest import ApiException +from pprint import pprint + +# Defining the host is optional and defaults to https://api.vulncheck.com +# See configuration.py for a list of all supported configuration parameters. +configuration = vulncheck_sdk.Configuration( + host = "https://api.vulncheck.com" +) + +# The client must configure the authentication and authorization parameters +# in accordance with the API server security policy. +# Examples for each auth method are provided below, use the example that +# satisfies your auth use case. + +# Configure API key authorization: Bearer +configuration.api_key['Bearer'] = os.environ["API_KEY"] + +# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed +# configuration.api_key_prefix['Bearer'] = 'Bearer' + +# Enter a context with an instance of the API client +with vulncheck_sdk.ApiClient(configuration) as api_client: + # Create an instance of the API class + api_instance = vulncheck_sdk.IndicesApi(api_client) + page = 56 # int | set the page number of the response (optional) + limit = 56 # int | limit the number of findings in the response (optional) + cursor = 'cursor_example' # str | continue server-side paging using a cursor id (optional) + start_cursor = 'start_cursor_example' # str | request server-side paging (optional) + order = 'order_example' # str | direction of the sort (optional) + sort = 'sort_example' # str | field by which to sort the results (optional) + cve = 'cve_example' # str | Specify a CVE ID to search with. (optional) + alias = 'alias_example' # str | Specify a vulnerability alias to search with. (optional) + iava = 'iava_example' # str | Specify an IAVA ID to search with. (optional) + jvndb = 'jvndb_example' # str | Specify a JVNDB ID to search with. (optional) + ilvn = 'ilvn_example' # str | Specify an ILVN ID to search with. (optional) + threat_actor = 'threat_actor_example' # str | Specify a threat actor name to search with. (optional) + mitre_id = 'mitre_id_example' # str | Specify a MITRE ID to search with. (optional) + misp_id = 'misp_id_example' # str | Specify a MISP ID to search with. (optional) + ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) + botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) + published = 'published_example' # str | Specify a published date (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) + updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) + updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) + last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) + last_mod_end_date = 'last_mod_end_date_example' # str | Specify an ending last modified date to filter with. (optional) + pub_start_date = 'pub_start_date_example' # str | Specify a starting published date to filter with. (optional) + pub_end_date = 'pub_end_date_example' # str | Specify an ending published date to filter with. (optional) + + try: + # Return vulnerability data stored in index \"omron-eol\" + api_response = api_instance.index_omron_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + print("The response of IndicesApi->index_omron_eol_get:\n") + pprint(api_response) + except Exception as e: + print("Exception when calling IndicesApi->index_omron_eol_get: %s\n" % e) +``` + + + +### Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **page** | **int**| set the page number of the response | [optional] + **limit** | **int**| limit the number of findings in the response | [optional] + **cursor** | **str**| continue server-side paging using a cursor id | [optional] + **start_cursor** | **str**| request server-side paging | [optional] + **order** | **str**| direction of the sort | [optional] + **sort** | **str**| field by which to sort the results | [optional] + **cve** | **str**| Specify a CVE ID to search with. | [optional] + **alias** | **str**| Specify a vulnerability alias to search with. | [optional] + **iava** | **str**| Specify an IAVA ID to search with. | [optional] + **jvndb** | **str**| Specify a JVNDB ID to search with. | [optional] + **ilvn** | **str**| Specify an ILVN ID to search with. | [optional] + **threat_actor** | **str**| Specify a threat actor name to search with. | [optional] + **mitre_id** | **str**| Specify a MITRE ID to search with. | [optional] + **misp_id** | **str**| Specify a MISP ID to search with. | [optional] + **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] + **botnet** | **str**| Specify a botnet name to search with. | [optional] + **published** | **str**| Specify a published date | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] + **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] + **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] + **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] + **last_mod_end_date** | **str**| Specify an ending last modified date to filter with. | [optional] + **pub_start_date** | **str**| Specify a starting published date to filter with. | [optional] + **pub_end_date** | **str**| Specify an ending published date to filter with. | [optional] + +### Return type + +[**RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination**](RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination.md) + +### Authorization + +[Bearer](../README.md#Bearer) + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | OK | - | +**404** | Not Found | - | +**500** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **index_omron_get** > RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination index_omron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) @@ -66852,6 +66992,144 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **index_zebra_eol_get** +> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination index_zebra_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + +Return vulnerability data stored in index \"zebra-eol\" + +### Overview +This endpoint allows you to retrieve a paginated list of all documents from the zebra-eol index. \ +By default, a maximum of 100 documents are shown per page. + +**Index Description:** Zebra End of Life Notices + +### Paging Over Large Data (cursor) +In order to allow users to iterate over large index datasets, this endpoint provides a server-side +"cursor" mechanism. To use the cursor, first call `GET /index/zebra-eol?start_cursor`, the response will +have a `next_cursor` id that clients will need to pass as a query parameter to the next request like +`GET /index/zebra-eol?cursor=` + + +### Example + +* Api Key Authentication (Bearer): + +```python +import vulncheck_sdk +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination +from vulncheck_sdk.rest import ApiException +from pprint import pprint + +# Defining the host is optional and defaults to https://api.vulncheck.com +# See configuration.py for a list of all supported configuration parameters. +configuration = vulncheck_sdk.Configuration( + host = "https://api.vulncheck.com" +) + +# The client must configure the authentication and authorization parameters +# in accordance with the API server security policy. +# Examples for each auth method are provided below, use the example that +# satisfies your auth use case. + +# Configure API key authorization: Bearer +configuration.api_key['Bearer'] = os.environ["API_KEY"] + +# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed +# configuration.api_key_prefix['Bearer'] = 'Bearer' + +# Enter a context with an instance of the API client +with vulncheck_sdk.ApiClient(configuration) as api_client: + # Create an instance of the API class + api_instance = vulncheck_sdk.IndicesApi(api_client) + page = 56 # int | set the page number of the response (optional) + limit = 56 # int | limit the number of findings in the response (optional) + cursor = 'cursor_example' # str | continue server-side paging using a cursor id (optional) + start_cursor = 'start_cursor_example' # str | request server-side paging (optional) + order = 'order_example' # str | direction of the sort (optional) + sort = 'sort_example' # str | field by which to sort the results (optional) + cve = 'cve_example' # str | Specify a CVE ID to search with. (optional) + alias = 'alias_example' # str | Specify a vulnerability alias to search with. (optional) + iava = 'iava_example' # str | Specify an IAVA ID to search with. (optional) + jvndb = 'jvndb_example' # str | Specify a JVNDB ID to search with. (optional) + ilvn = 'ilvn_example' # str | Specify an ILVN ID to search with. (optional) + threat_actor = 'threat_actor_example' # str | Specify a threat actor name to search with. (optional) + mitre_id = 'mitre_id_example' # str | Specify a MITRE ID to search with. (optional) + misp_id = 'misp_id_example' # str | Specify a MISP ID to search with. (optional) + ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) + botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) + published = 'published_example' # str | Specify a published date (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) + updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) + updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) + last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) + last_mod_end_date = 'last_mod_end_date_example' # str | Specify an ending last modified date to filter with. (optional) + pub_start_date = 'pub_start_date_example' # str | Specify a starting published date to filter with. (optional) + pub_end_date = 'pub_end_date_example' # str | Specify an ending published date to filter with. (optional) + + try: + # Return vulnerability data stored in index \"zebra-eol\" + api_response = api_instance.index_zebra_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + print("The response of IndicesApi->index_zebra_eol_get:\n") + pprint(api_response) + except Exception as e: + print("Exception when calling IndicesApi->index_zebra_eol_get: %s\n" % e) +``` + + + +### Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **page** | **int**| set the page number of the response | [optional] + **limit** | **int**| limit the number of findings in the response | [optional] + **cursor** | **str**| continue server-side paging using a cursor id | [optional] + **start_cursor** | **str**| request server-side paging | [optional] + **order** | **str**| direction of the sort | [optional] + **sort** | **str**| field by which to sort the results | [optional] + **cve** | **str**| Specify a CVE ID to search with. | [optional] + **alias** | **str**| Specify a vulnerability alias to search with. | [optional] + **iava** | **str**| Specify an IAVA ID to search with. | [optional] + **jvndb** | **str**| Specify a JVNDB ID to search with. | [optional] + **ilvn** | **str**| Specify an ILVN ID to search with. | [optional] + **threat_actor** | **str**| Specify a threat actor name to search with. | [optional] + **mitre_id** | **str**| Specify a MITRE ID to search with. | [optional] + **misp_id** | **str**| Specify a MISP ID to search with. | [optional] + **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] + **botnet** | **str**| Specify a botnet name to search with. | [optional] + **published** | **str**| Specify a published date | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] + **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] + **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] + **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] + **last_mod_end_date** | **str**| Specify an ending last modified date to filter with. | [optional] + **pub_start_date** | **str**| Specify a starting published date to filter with. | [optional] + **pub_end_date** | **str**| Specify an ending published date to filter with. | [optional] + +### Return type + +[**RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination**](RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination.md) + +### Authorization + +[Bearer](../README.md#Bearer) + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | OK | - | +**404** | Not Found | - | +**500** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **index_zebra_get** > RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination index_zebra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination.md new file mode 100644 index 00000000..eaa5ef12 --- /dev/null +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination.md @@ -0,0 +1,32 @@ +# RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination + +render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**benchmark** | **float** | | [optional] +**meta** | [**PaginatePagination**](PaginatePagination.md) | | [optional] +**data** | [**List[AdvisoryGenericEOL]**](AdvisoryGenericEOL.md) | | [optional] + +## Example + +```python +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination + +# TODO update the JSON string below +json = "{}" +# create an instance of RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination from a JSON string +render_response_with_metadata_array_advisory_generic_eol_paginate_pagination_instance = RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination.from_json(json) +# print the JSON string representation of the object +print(RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination.to_json()) + +# convert the object into a dict +render_response_with_metadata_array_advisory_generic_eol_paginate_pagination_dict = render_response_with_metadata_array_advisory_generic_eol_paginate_pagination_instance.to_dict() +# create an instance of RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination from a dict +render_response_with_metadata_array_advisory_generic_eol_paginate_pagination_from_dict = RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination.from_dict(render_response_with_metadata_array_advisory_generic_eol_paginate_pagination_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/openapi.json b/openapi.json index 0d907f49..34e0a1e0 100644 --- a/openapi.json +++ b/openapi.json @@ -1 +1 @@ -{"components":{"schemas":{"advisory.A10":{"description":"advisory.A10","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"reference":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ABBAdvisory":{"description":"advisory.ABBAdvisory","properties":{"abb_vulnerability_id":{"items":{"type":"string"},"type":"array","uniqueItems":false},"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"document_id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ADP":{"description":"advisory.ADP","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"metrics":{"items":{"$ref":"#/components/schemas/advisory.VulnrichmentMetric"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"}},"type":"object"},"advisory.ADPContainer":{"description":"advisory.ADPContainer","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"datePublic":{"description":"OK","type":"string"},"descriptions":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false},"impacts":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.Impact"},"type":"array","uniqueItems":false},"metrics":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.Metric"},"type":"array","uniqueItems":false},"problemTypes":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.MProblemTypes"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/components/schemas/advisory.MReference"},"type":"array","uniqueItems":false},"tags":{"description":"OK","items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"description":"OK","type":"string"}},"type":"object"},"advisory.AIX":{"description":"advisory.AIX","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMD":{"description":"advisory.AMD","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMI":{"description":"advisory.AMI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ASRG":{"description":"advisory.ASRG","properties":{"affected_products":{"type":"string"},"capec":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"problem_type":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVEVAAdvisory":{"description":"advisory.AVEVAAdvisory","properties":{"aveva_vulnerability_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"published_by":{"type":"string"},"rating":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVIDMLAdvs":{"description":"advisory.AVIDMLAdvs","properties":{"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AWS":{"description":"advisory.AWS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Abbott":{"description":"advisory.Abbott","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Absolute":{"description":"advisory.Absolute","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Acknowledgement":{"description":"advisory.Acknowledgement","properties":{"name":{"items":{"$ref":"#/components/schemas/advisory.IVal"},"type":"array","uniqueItems":false},"url":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Acronis":{"description":"advisory.Acronis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdobeAdvisory":{"description":"advisory.AdobeAdvisory","properties":{"adobe_cves":{"items":{"$ref":"#/components/schemas/advisory.AdobeCVE"},"type":"array","uniqueItems":false},"affected":{"items":{"$ref":"#/components/schemas/advisory.AdobeAffected"},"type":"array"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"solutions":{"items":{"$ref":"#/components/schemas/advisory.AdobeSolution"},"type":"array"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AdobeAffected":{"description":"advisory.AdobeAffected","properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AdobeCVE":{"description":"advisory.AdobeCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.AdobeSolution":{"description":"advisory.AdobeSolution","properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Advantech":{"description":"advisory.Advantech","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Advisory":{"description":"advisory.Advisory","properties":{"affects":{"type":"string"},"announced":{"type":"string"},"category":{"type":"string"},"corrections":{"items":{"$ref":"#/components/schemas/advisory.Correction"},"type":"array"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"module":{"type":"string"},"name":{"type":"string"},"topic":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdvisoryDetails":{"description":"advisory.AdvisoryDetails","properties":{"bugzilla":{"$ref":"#/components/schemas/advisory.Bugzilla"},"cve":{"$ref":"#/components/schemas/advisory.OvalCVE"},"issued":{"$ref":"#/components/schemas/advisory.Issued"},"severity":{"type":"string"},"updated":{"$ref":"#/components/schemas/advisory.Updated"}},"type":"object"},"advisory.AdvisoryRecord":{"description":"advisory.AdvisoryRecord","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"external_id":{"items":{"type":"string"},"type":"array","uniqueItems":false},"lang":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.Affected":{"description":"advisory.Affected","properties":{"database_specific":{"description":"The meaning of the values within the object is entirely defined by the database"},"ecosystem_specific":{"description":"The meaning of the values within the object is entirely defined by the ecosystem"},"package":{"$ref":"#/components/schemas/advisory.OSVPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.Range"},"type":"array","uniqueItems":false},"severity":{"items":{"$ref":"#/components/schemas/advisory.Severity"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AffectedChrome":{"description":"advisory.AffectedChrome","properties":{"fixed_version":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.AffectedDebianPackage":{"description":"advisory.AffectedDebianPackage","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRelease":{"description":"advisory.AffectedDebianRelease","properties":{"fixed_version":{"type":"string"},"nodsa":{"type":"string"},"nodsa_reason":{"type":"string"},"release_name":{"type":"string"},"repositories":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianRepository"},"type":"array","uniqueItems":false},"status":{"type":"string"},"urgency":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRepository":{"description":"advisory.AffectedDebianRepository","properties":{"repository_name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedFile":{"description":"advisory.AffectedFile","properties":{"file_last_modified":{"type":"string"},"file_name":{"type":"string"}},"type":"object"},"advisory.AffectedProduct":{"description":"advisory.AffectedProduct","properties":{"affectedReleases":{"type":"string"},"fixedReleases":{"type":"string"},"lexmarkModels":{"type":"string"}},"type":"object"},"advisory.AffectedRel":{"description":"advisory.AffectedRel","properties":{"advisory":{"type":"string"},"cpe":{"type":"string"},"package":{"type":"string"},"product_name":{"type":"string"},"release_date":{"type":"string"}},"type":"object"},"advisory.AffectedUbuntuPackage":{"description":"advisory.AffectedUbuntuPackage","properties":{"break_commit_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fix_commit_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package_name":{"type":"string"},"package_release_status":{"items":{"$ref":"#/components/schemas/advisory.UbuntuPackageReleaseStatus"},"type":"array","uniqueItems":false},"upstream_fix_url":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AlephResearch":{"description":"advisory.AlephResearch","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Alibaba":{"description":"advisory.Alibaba","properties":{"cnnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation_cn":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AlmaDate":{"description":"advisory.AlmaDate","properties":{"$date":{"type":"integer"}},"type":"object"},"advisory.AlmaLinuxUpdate":{"description":"advisory.AlmaLinuxUpdate","properties":{"bs_repo_id":{"$ref":"#/components/schemas/advisory.AlmaObjectID"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fromstr":{"type":"string"},"id":{"$ref":"#/components/schemas/advisory.AlmaObjectID"},"issued_date":{"$ref":"#/components/schemas/advisory.AlmaDate"},"pkglist":{"$ref":"#/components/schemas/advisory.AlmaPackageList"},"pushcount":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.AlmaReference"},"type":"array","uniqueItems":false},"release":{"type":"string"},"rights":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"update_url":{"type":"string"},"updated_date":{"$ref":"#/components/schemas/advisory.AlmaDate"},"updateinfo_id":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaObjectID":{"description":"advisory.AlmaObjectID","properties":{"$oid":{"type":"string"}},"type":"object"},"advisory.AlmaPackage":{"description":"advisory.AlmaPackage","properties":{"arch":{"type":"string"},"epoch":{"type":"string"},"filename":{"type":"string"},"name":{"type":"string"},"reboot_suggested":{"type":"integer"},"release":{"type":"string"},"source":{"type":"string"},"sum":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaPackageList":{"description":"advisory.AlmaPackageList","properties":{"name":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.AlmaPackage"},"type":"array","uniqueItems":false},"shortname":{"type":"string"}},"type":"object"},"advisory.AlmaReference":{"description":"advisory.AlmaReference","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDB":{"description":"advisory.AlpineLinuxSecDB","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"distroversion":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecDBPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDBPackage":{"description":"advisory.AlpineLinuxSecDBPackage","properties":{"package_name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecurityFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AlpineLinuxSecurityFix":{"description":"advisory.AlpineLinuxSecurityFix","properties":{"cve":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"advisory.AmazonAffectedPackage":{"description":"advisory.AmazonAffectedPackage","properties":{"advisory":{"type":"string"},"package":{"type":"string"},"platform":{"type":"string"},"releaseDate":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.AmazonCVE":{"description":"advisory.AmazonCVE","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AmazonAffectedPackage"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AnchoreNVDOverride":{"description":"advisory.AnchoreNVDOverride","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"override":{"$ref":"#/components/schemas/advisory.Override"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAdvisory":{"description":"advisory.AndroidAdvisory","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AndroidAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.AndroidReference"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAffected":{"description":"advisory.AndroidAffected","properties":{"ecosystem_specific":{"$ref":"#/components/schemas/advisory.EcoSystem"},"package":{"$ref":"#/components/schemas/advisory.AndroidPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.AndroidRange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AndroidEvent":{"description":"advisory.AndroidEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.AndroidPackage":{"description":"advisory.AndroidPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.AndroidRange":{"description":"advisory.AndroidRange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.AndroidEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.AndroidReference":{"description":"advisory.AndroidReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheActiveMQ":{"description":"advisory.ApacheActiveMQ","properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArchiva":{"description":"advisory.ApacheArchiva","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArrow":{"description":"advisory.ApacheArrow","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCamel":{"description":"advisory.ApacheCamel","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCommons":{"description":"advisory.ApacheCommons","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCouchDB":{"description":"advisory.ApacheCouchDB","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheFlink":{"description":"advisory.ApacheFlink","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.ApacheGuacamole":{"description":"advisory.ApacheGuacamole","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHTTP":{"description":"advisory.ApacheHTTP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHadoop":{"description":"advisory.ApacheHadoop","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheJSPWiki":{"description":"advisory.ApacheJSPWiki","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheKafka":{"description":"advisory.ApacheKafka","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheLoggingServices":{"description":"advisory.ApacheLoggingServices","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheNiFi":{"description":"advisory.ApacheNiFi","properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOFBiz":{"description":"advisory.ApacheOFBiz","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenMeetings":{"description":"advisory.ApacheOpenMeetings","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenOffice":{"description":"advisory.ApacheOpenOffice","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApachePulsar":{"description":"advisory.ApachePulsar","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheShiro":{"description":"advisory.ApacheShiro","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSpark":{"description":"advisory.ApacheSpark","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheStruts":{"description":"advisory.ApacheStruts","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"rating":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_version":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ApacheSubversion":{"description":"advisory.ApacheSubversion","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSuperset":{"description":"advisory.ApacheSuperset","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheTomcat":{"description":"advisory.ApacheTomcat","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheZooKeeper":{"description":"advisory.ApacheZooKeeper","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppCheck":{"description":"advisory.AppCheck","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Appgate":{"description":"advisory.Appgate","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleAdvisory":{"description":"advisory.AppleAdvisory","properties":{"components":{"items":{"$ref":"#/components/schemas/advisory.AppleComponent"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleComponent":{"description":"advisory.AppleComponent","properties":{"available_for":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"impact":{"type":"string"},"itw_exploit":{"type":"boolean"},"name":{"type":"string"}},"type":"object"},"advisory.ArchIssue":{"description":"advisory.ArchIssue","properties":{"advisories":{"items":{"type":"string"},"type":"array"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"issues":{"description":"cves","items":{"type":"string"},"type":"array"},"name":{"type":"string"},"packages":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"ticket":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Arista":{"description":"advisory.Arista","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Aruba":{"description":"advisory.Aruba","properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AssetNote":{"description":"advisory.AssetNote","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asterisk":{"description":"advisory.Asterisk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Astra":{"description":"advisory.Astra","properties":{"bdu":{"items":{"type":"string"},"type":"array","uniqueItems":false},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_ru":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asus":{"description":"advisory.Asus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianAdvisory":{"description":"advisory.AtlassianAdvisory","properties":{"affected_version":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"detailed_summary":{"description":"overloading in places with 'RiskAssessment' and other places with\n'Description'","type":"string"},"fixed_version":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"release_date":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianProducts":{"description":"advisory.AtlassianProducts","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"}},"type":"object"},"advisory.AtlassianVuln":{"description":"advisory.AtlassianVuln","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"$ref":"#/components/schemas/advisory.AtlassianProducts"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Atredis":{"description":"advisory.Atredis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendors":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Audiocodes":{"description":"advisory.Audiocodes","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AusCert":{"description":"advisory.AusCert","properties":{"body":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"link":{"type":"string"},"operatingSystem":{"type":"string"},"product":{"type":"string"},"publisher":{"type":"string"},"resolution":{"type":"string"}},"type":"object"},"advisory.Autodesk":{"description":"advisory.Autodesk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avaya":{"description":"advisory.Avaya","properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"last_revised":{"type":"string"},"overview":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avigilon":{"description":"advisory.Avigilon","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Award":{"description":"advisory.Award","properties":{"amount":{"type":"string"},"currency":{"type":"string"}},"type":"object"},"advisory.Axis":{"description":"advisory.Axis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Azul":{"description":"advisory.Azul","properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"prime_version":{"items":{"$ref":"#/components/schemas/advisory.PrimeVersion"},"type":"array","uniqueItems":false},"release":{"type":"string"},"url":{"type":"string"},"zulu_version":{"items":{"$ref":"#/components/schemas/advisory.ZuluVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BBraunAdvisory":{"description":"advisory.BBraunAdvisory","properties":{"attention":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"equipment":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerabilities":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BDUAdvisory":{"description":"advisory.BDUAdvisory","properties":{"bdu_id":{"description":"BDU:2022-03833","type":"string"},"cve":{"description":"[]string{\"CVE-2022-28194\"}","items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"$ref":"#/components/schemas/advisory.BDUCvss"},"cvss3":{"$ref":"#/components/schemas/advisory.BDUCvss3"},"cwe":{"description":"CWE-119","type":"string"},"date_added":{"type":"string"},"description_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"environment":{"$ref":"#/components/schemas/advisory.BDUEnvironment"},"exploit_status_en":{"description":"Exploited","type":"string"},"exploit_status_ru":{"description":"Exploited","type":"string"},"fix_status_en":{"description":"Fixed","type":"string"},"fix_status_ru":{"description":"Fixed","type":"string"},"identify_date":{"description":"2022-09-01","type":"string"},"name_ru":{"description":"BDU:2022-03833: Уязвимость модуля Cboot (tegrabl_cbo.c) пакета драйверов микропрограммного обеспечения вычислительных плат NVIDIA Jetson, позволяющая нарушителю выполнить произвольный код или вызвать частичный отказ в обслуживании","type":"string"},"severity_ru":{"description":"High","type":"string"},"solution_ru":{"description":"Обновите драйверы микропрограммного обеспечения вычислительных плат NVIDIA Jetson до версии 32.6.1 или более поздней","type":"string"},"sources":{"description":"https://nvd.nist.gov/vuln/detail/CVE-2022-28194","items":{"type":"string"},"type":"array","uniqueItems":false},"text_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"url":{"description":"https://bdu.fstec.ru/vul/2022-03833","type":"string"},"vul_status_en":{"description":"Exploitable","type":"string"},"vul_status_ru":{"description":"Exploitable","type":"string"},"vulnerable_software":{"$ref":"#/components/schemas/advisory.BDUVulnerableSoftware"}},"type":"object"},"advisory.BDUCvss":{"description":"advisory.BDUCvss","properties":{"vector":{"$ref":"#/components/schemas/advisory.BDUVector"}},"type":"object"},"advisory.BDUCvss3":{"description":"advisory.BDUCvss3","properties":{"vector":{"$ref":"#/components/schemas/advisory.BDUVector"}},"type":"object"},"advisory.BDUEnvironment":{"description":"advisory.BDUEnvironment","properties":{"os":{"$ref":"#/components/schemas/advisory.BDUOs"}},"type":"object"},"advisory.BDUOs":{"description":"advisory.BDUOs","properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUSoft":{"description":"advisory.BDUSoft","properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"types":{"$ref":"#/components/schemas/advisory.BDUTypes"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUTypes":{"description":"advisory.BDUTypes","properties":{"text":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.BDUVector":{"description":"advisory.BDUVector","properties":{"score":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.BDUVulnerableSoftware":{"description":"advisory.BDUVulnerableSoftware","properties":{"soft":{"$ref":"#/components/schemas/advisory.BDUSoft"}},"type":"object"},"advisory.BLS":{"description":"advisory.BLS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"prodcut":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Bandr":{"description":"advisory.Bandr","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"document_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BaxterAdvisory":{"description":"advisory.BaxterAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeckhoffAdvisory":{"description":"advisory.BeckhoffAdvisory","properties":{"beckhoff_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"description":"if in the future we can delete this great - it's just a dupe to\nnormalize the field names","type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BeckmanCoulter":{"description":"advisory.BeckmanCoulter","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BectonDickinsonAdvisory":{"description":"advisory.BectonDickinsonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products_affected":{"items":{"$ref":"#/components/schemas/advisory.ProductsAffected"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeldenAdvisory":{"description":"advisory.BeldenAdvisory","properties":{"belden_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BeyondTrust":{"description":"advisory.BeyondTrust","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Binarly":{"description":"advisory.Binarly","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BitDefender":{"description":"advisory.BitDefender","properties":{"additional_details":{"type":"string"},"affected_products":{"type":"string"},"affected_vendors":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"details":{"type":"string"},"timeline":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BlackBerry":{"description":"advisory.BlackBerry","properties":{"bsrt":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BoschAdvisory":{"description":"advisory.BoschAdvisory","properties":{"bosch_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BostonScientificAdvisory":{"description":"advisory.BostonScientificAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Botnet":{"description":"advisory.Botnet","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"botnet_name":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Bugzilla":{"description":"advisory.Bugzilla","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CACyberCentreAdvisory":{"description":"advisory.CACyberCentreAdvisory","properties":{"control_systems":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"html_url":{"type":"string"},"serial_number":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CBLMariner":{"description":"advisory.CBLMariner","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CERTEUAdvisory":{"description":"advisory.CERTEUAdvisory","properties":{"advisoryId":{"type":"string"},"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"history":{"items":{"type":"string"},"type":"array"},"link":{"type":"string"},"recommendations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"technicalDetails":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CESA":{"description":"advisory.CESA","properties":{"arch":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"issueDate":{"type":"string"},"osRelease":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.CentosPackage"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CISAAlert":{"description":"advisory.CISAAlert","properties":{"AffectedProducts":{"type":"string"},"AlertID":{"type":"string"},"Archived":{"type":"boolean"},"CVEExploitedITW":{"type":"boolean"},"CVSS":{"type":"string"},"ICSMA":{"type":"boolean"},"Mitigations":{"type":"string"},"ReleaseDate":{"type":"string"},"Title":{"type":"string"},"Url":{"type":"string"},"Vendor":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CISControl":{"description":"advisory.CISControl","properties":{"cis_control_description":{"type":"string"},"cis_control_id":{"type":"string"},"cis_control_name":{"type":"string"}},"type":"object"},"advisory.CNNVDEntryJSON":{"description":"advisory.CNNVDEntryJSON","properties":{"bugtraq-id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"modified-date":{"type":"string"},"name_cn":{"type":"string"},"published-date":{"type":"string"},"severity_cn":{"type":"string"},"severity_en":{"type":"string"},"source":{"type":"string"},"url":{"type":"string"},"vuln-description_cn":{"type":"string"},"vuln-solution":{"type":"string"},"vuln-type_cn":{"type":"string"},"vuln-type_en":{"type":"string"}},"type":"object"},"advisory.CNVDBulletin":{"description":"advisory.CNVDBulletin","properties":{"cnta":{"type":"string"},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CNVDFlaw":{"description":"advisory.CNVDFlaw","properties":{"affected_products_cn":{"type":"string"},"bugtraq_id":{"type":"string"},"cnvd":{"type":"string"},"collection_time":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"harm_level":{"type":"string"},"id":{"type":"string"},"public_date":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"submission_time":{"type":"string"},"title_cn":{"type":"string"},"update_time":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"validation_info_cn":{"type":"string"},"validation_info_en":{"type":"string"},"vendor_patch_cn":{"type":"string"},"vuln_attachments":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vuln_description_cn":{"type":"string"},"vuln_solution_cn":{"type":"string"},"vuln_type_cn":{"type":"string"}},"type":"object"},"advisory.COSUpdate":{"description":"advisory.COSUpdate","properties":{"changed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"featured":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"reference":{"type":"string"},"security":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated":{"type":"string"}},"type":"object"},"advisory.CPEMatch":{"description":"advisory.CPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.CPENode":{"description":"advisory.CPENode","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.CPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.CSAF":{"description":"advisory.CSAF","properties":{"document":{"$ref":"#/components/schemas/advisory.DocumentMetadata"},"notes":{"description":"Notes holds notes associated with the whole document.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"product_tree":{"$ref":"#/components/schemas/advisory.ProductBranch"},"vulnerabilities":{"description":"Vulnerabilities contains information about the vulnerabilities,\n(i.e. CVEs), associated threats, and product status.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property","items":{"$ref":"#/components/schemas/advisory.CSAFVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CSAFDistribution":{"description":"advisory.CSAFDistribution","type":"object"},"advisory.CSAFNote":{"description":"advisory.CSAFNote","properties":{"audience":{"type":"string"},"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CSAFReference":{"description":"advisory.CSAFReference","properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CSAFRelationship":{"description":"advisory.CSAFRelationship","properties":{"category":{"type":"string"},"full_product_name":{"$ref":"#/components/schemas/advisory.Product"},"product_reference":{"type":"string"},"relates_to_product_reference":{"type":"string"}},"type":"object"},"advisory.CSAFScore":{"description":"advisory.CSAFScore","properties":{"cvss_v2":{"$ref":"#/components/schemas/advisory.CVSSV2"},"cvss_v3":{"$ref":"#/components/schemas/advisory.CVSSV3"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CSAFVulnerability":{"description":"advisory.CSAFVulnerability","properties":{"cve":{"description":"MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3232-vulnerabilities-property---cve","type":"string"},"cwe":{"$ref":"#/components/schemas/advisory.Cwe"},"flags":{"description":"Machine readable flags for products related to vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3235-vulnerabilities-property---flags","items":{"$ref":"#/components/schemas/advisory.Flag"},"type":"array","uniqueItems":false},"ids":{"description":"List of IDs represents a list of unique labels or tracking IDs for the vulnerability (if such information exists).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3236-vulnerabilities-property---ids","items":{"$ref":"#/components/schemas/advisory.TrackingID"},"type":"array","uniqueItems":false},"notes":{"description":"Notes holds notes associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3238-vulnerabilities-property---notes","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"product_status":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Provide details on the status of the referenced product related to the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3239-vulnerabilities-property---product-status","type":"object"},"references":{"description":"Vulnerability references holds a list of references associated with this vulnerability item.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32310-vulnerabilities-property---references","items":{"$ref":"#/components/schemas/advisory.CSAFReference"},"type":"array","uniqueItems":false},"release_date":{"type":"string"},"remediations":{"description":"Provide details of remediations associated with a Vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32312-vulnerabilities-property---remediations","items":{"$ref":"#/components/schemas/advisory.RemediationData"},"type":"array","uniqueItems":false},"scores":{"description":"Scores holds the scores associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32313-vulnerabilities-property---scores\nCurrently only CVSS v3 is supported.","items":{"$ref":"#/components/schemas/advisory.CSAFScore"},"type":"array","uniqueItems":false},"threats":{"description":"Provide details of threats associated with a vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32314-vulnerabilities-property---threats","items":{"$ref":"#/components/schemas/advisory.ThreatData"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CVEDetail":{"description":"advisory.CVEDetail","properties":{"baseScore":{"type":"string"},"cveid":{"type":"string"},"description":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.CVEDetailsLink":{"description":"advisory.CVEDetailsLink","properties":{"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.CVEReference":{"description":"advisory.CVEReference","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVSS":{"description":"advisory.CVSS","properties":{"score":{"type":"string"},"severity":{"type":"string"},"type":{"type":"string"},"vector":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV2":{"description":"advisory.CVSSV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"}},"type":"object"},"advisory.CVSSV3":{"description":"advisory.CVSSV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV40":{"description":"this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics","properties":{"Automatable":{"type":"string"},"Recovery":{"type":"string"},"Safety":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityRequirement":{"type":"string"},"exploitMaturity":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackRequirements":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedSubAvailabilityImpact":{"type":"string"},"modifiedSubConfidentialityImpact":{"type":"string"},"modifiedSubIntegrityImpact":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"modifiedVulnAvailabilityImpact":{"type":"string"},"modifiedVulnConfidentialityImpact":{"type":"string"},"modifiedVulnIntegrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.CVSSV40Threat":{"description":"advisory.CVSSV40Threat","properties":{"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"advisory.CWENode":{"description":"advisory.CWENode","type":"object"},"advisory.CanvasExploit":{"description":"advisory.CanvasExploit","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"exploit_pack":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Capec":{"description":"advisory.Capec","properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"advisory.CarestreamAdvisory":{"description":"advisory.CarestreamAdvisory","properties":{"carestream_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Carrier":{"description":"advisory.Carrier","properties":{"advisory_id":{"type":"string"},"affected_product":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CentosPackage":{"description":"advisory.CentosPackage","properties":{"filename":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CertBE":{"description":"advisory.CertBE","properties":{"affected_software":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability_type":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CertFRAdvisory":{"description":"advisory.CertFRAdvisory","properties":{"affected_systems_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resume_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"source_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIN":{"description":"advisory.CertIN","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIRSecurityAlert":{"description":"advisory.CertIRSecurityAlert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_fa":{"type":"string"},"title_fa":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertSE":{"description":"advisory.CertSE","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_sv":{"type":"string"},"title_sv":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertUA":{"description":"advisory.CertUA","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_ua":{"type":"string"},"title_ua":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ChainGuard":{"description":"advisory.ChainGuard","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.ChainGuardPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.ChainGuardPackage":{"description":"advisory.ChainGuardPackage","properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.ChainGuardSecFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ChainGuardSecFix":{"description":"advisory.ChainGuardSecFix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"}},"type":"object"},"advisory.CheckPoint":{"description":"advisory.CheckPoint","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Chrome":{"description":"advisory.Chrome","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AffectedChrome"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ciena":{"description":"advisory.Ciena","properties":{"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issue_no":{"type":"integer"},"security_advisory_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_products":{"items":{"$ref":"#/components/schemas/advisory.VulnerableProduct"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CisaCsafAdv":{"description":"advisory.CisaCsafAdv","properties":{"csaf_json":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoAdvisory":{"description":"advisory.CiscoAdvisory","properties":{"ciscoBugId":{"description":"multiple","type":"string"},"csaf":{"type":"string"},"cve":{"description":"multiple","items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf":{"type":"string"},"cwe":{"description":"multiple","type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"identifier":{"type":"string"},"name":{"type":"string"},"related_resources":{"type":"string"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"totalCount":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"},"workarounds":{"type":"string"},"workflowStatus":{"type":"string"}},"type":"object"},"advisory.CiscoCSAF":{"description":"advisory.CiscoCSAF","properties":{"csaf":{},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"identifier":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoKnownGoodValue":{"description":"advisory.CiscoKnownGoodValue","properties":{"biv_category":{"type":"string"},"biv_hash":{"type":"string"},"date_added":{"type":"string"},"dtype":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"platform":{"type":"string"},"published":{"type":"string"},"sha1":{"type":"string"},"sha256":{"type":"string"},"sha512":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CitrixAdvisory":{"description":"advisory.CitrixAdvisory","properties":{"citrixId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.ClarotyVulnerability":{"description":"advisory.ClarotyVulnerability","properties":{"advisory_url":{"type":"string"},"claroty_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v3":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"product":{"type":"string"},"target":{"type":"string"},"vendor":{"type":"string"},"vendor_advisory_url":{"type":"string"}},"type":"object"},"advisory.CloudBees":{"description":"advisory.CloudBees","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CloudVulnDBAdvisory":{"description":"advisory.CloudVulnDBAdvisory","properties":{"affectedServices":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CodesysAdvisory":{"description":"advisory.CodesysAdvisory","properties":{"codesys_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVault":{"description":"advisory.CommVault","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultCVEDetails"},"type":"array","uniqueItems":false},"cvss_range":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"impacted_product":{"$ref":"#/components/schemas/advisory.CommVaultImpactedProduct"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"resolution":{"$ref":"#/components/schemas/advisory.CommVaultResolution"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVaultCVEDetails":{"description":"advisory.CommVaultCVEDetails","properties":{"cve_id":{"type":"string"},"cvss":{"type":"string"},"description":{"type":"string"},"external_links":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultImpactedProduct":{"description":"advisory.CommVaultImpactedProduct","properties":{"description":{"type":"string"},"impacted_product_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultImpactedProductDetails"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultImpactedProductDetails":{"description":"advisory.CommVaultImpactedProductDetails","properties":{"affected_versions":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product_name":{"type":"string"},"resolved_versions":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.CommVaultResolution":{"description":"advisory.CommVaultResolution","properties":{"description":{"type":"string"},"resolution_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultResolutionDetails"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultResolutionDetails":{"description":"advisory.CommVaultResolutionDetails","properties":{"feature_release":{"type":"string"},"maintenance_release":{"type":"string"}},"type":"object"},"advisory.CompassSecurity":{"description":"advisory.CompassSecurity","properties":{"csnc_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"effect":{"type":"string"},"introduction":{"type":"string"},"product":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"risk":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.ContainerOS":{"description":"advisory.ContainerOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updates":{"items":{"$ref":"#/components/schemas/advisory.COSUpdate"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.CoreImpactExploit":{"description":"advisory.CoreImpactExploit","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"platform":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Correction":{"description":"advisory.Correction","properties":{"correctedAt":{"type":"string"},"orelease":{"type":"string"},"release":{"type":"string"}},"type":"object"},"advisory.Credit":{"description":"advisory.Credit","properties":{"lang":{"type":"string"},"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Crestron":{"description":"advisory.Crestron","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"threat":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CrowdSec":{"description":"advisory.CrowdSec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"eitw":{"type":"boolean"},"first_seen":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Curl":{"description":"advisory.Curl","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"info":{"$ref":"#/components/schemas/advisory.OCurl"},"url":{"type":"string"}},"type":"object"},"advisory.CurlAffected":{"description":"advisory.CurlAffected","properties":{"ranges":{"items":{"$ref":"#/components/schemas/advisory.CurlRange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CurlCWE":{"description":"advisory.CurlCWE","properties":{"desc":{"type":"string"},"id":{"type":"string"}},"type":"object"},"advisory.CurlCredit":{"description":"advisory.CurlCredit","properties":{"name":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CurlRange":{"description":"advisory.CurlRange","properties":{"events":{"items":{"additionalProperties":{"type":"string"},"type":"object"},"type":"array","uniqueItems":false},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CustomCPE":{"description":"advisory.CustomCPE","properties":{"mcpeapplicability":{"$ref":"#/components/schemas/advisory.MCPEApplicability"},"stringValue":{"type":"string"}},"type":"object"},"advisory.Cvrf":{"description":"advisory.Cvrf","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CvsssV2_3":{"description":"advisory.CvsssV2_3","properties":{"basescore":{"type":"string"},"temporalscore":{"type":"string"}},"type":"object"},"advisory.Cwe":{"description":"advisory.Cwe","properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CweAcceptanceLevel":{"description":"advisory.CweAcceptanceLevel","properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.CweData":{"description":"advisory.CweData","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Cwes":{"description":"advisory.Cwes","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.CWENode"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Cycle":{"description":"advisory.Cycle","properties":{"codename":{"type":"string"},"cycle":{"type":"string"},"discontinued":{},"eol":{},"extendedSupport":{},"latest":{"type":"string"},"latestReleaseDate":{"type":"string"},"link":{"type":"string"},"lts":{},"releaseDate":{"type":"string"},"releaseLabel":{"type":"string"},"support":{}},"type":"object"},"advisory.DBSpecific":{"description":"advisory.DBSpecific","properties":{"CWE":{"$ref":"#/components/schemas/advisory.CurlCWE"},"award":{"$ref":"#/components/schemas/advisory.Award"},"last_affected":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"url":{"type":"string"},"www":{"type":"string"}},"type":"object"},"advisory.DFNCert":{"description":"advisory.DFNCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_de":{"type":"string"},"title_de":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DLink":{"description":"advisory.DLink","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DNN":{"description":"advisory.DNN","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dahua":{"description":"advisory.Dahua","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DanFossCVEDetails":{"description":"advisory.DanFossCVEDetails","properties":{"base_score":{"type":"string"},"cve":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Danfoss":{"description":"advisory.Danfoss","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_details":{"items":{"$ref":"#/components/schemas/advisory.DanFossCVEDetails"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dassault":{"description":"advisory.Dassault","properties":{"affected_products":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DateTime":{"description":"advisory.DateTime","type":"object"},"advisory.DebianCVE":{"description":"advisory.DebianCVE","properties":{"cve":{"type":"string"},"debianbug":{"type":"integer"},"description":{"type":"string"},"releases":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianRelease"},"type":"array","uniqueItems":false},"scope":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DebianSecurityAdvisory":{"description":"advisory.DebianSecurityAdvisory","properties":{"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianPackage"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dsa":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dell":{"description":"advisory.Dell","properties":{"articleNumber":{"type":"string"},"combinedProductList":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dell_cves":{"items":{"$ref":"#/components/schemas/advisory.DellCVE"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DellCVE":{"description":"advisory.DellCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.DeltaAdvisory":{"description":"advisory.DeltaAdvisory","properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"recommendedAction":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.DistroPackage":{"description":"advisory.DistroPackage","properties":{"binary":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"license":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"secFixes":{"items":{"$ref":"#/components/schemas/advisory.SecFix"},"type":"array"},"versions":{"items":{"$ref":"#/components/schemas/advisory.DistroVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.DistroVersion":{"description":"advisory.DistroVersion","properties":{"arch":{"type":"string"},"published_date":{"type":"string"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Django":{"description":"advisory.Django","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DocumentMetadata":{"description":"Document contains metadata about the CSAF document itself.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property","properties":{"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/components/schemas/advisory.CSAFDistribution"},"lang":{"type":"string"},"notes":{"description":"used by ncsc","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"publisher":{"$ref":"#/components/schemas/advisory.Publisher"},"references":{"items":{"$ref":"#/components/schemas/advisory.CSAFReference"},"type":"array","uniqueItems":false},"title":{"description":"Aggregate severity is a vehicle that is provided by the document producer to convey the urgency and\ncriticality with which the one or more vulnerabilities reported should be addressed.","type":"string"},"tracking":{"$ref":"#/components/schemas/advisory.Tracking"}},"type":"object"},"advisory.DocumentPublisher":{"description":"advisory.DocumentPublisher","properties":{"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"type":{"description":"the json for this is missing/broke","type":"integer"}},"type":"object"},"advisory.DotCMS":{"description":"advisory.DotCMS","properties":{"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"issue_id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DragosAdvisory":{"description":"advisory.DragosAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.Draytek":{"description":"advisory.Draytek","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Drupal":{"description":"advisory.Drupal","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"project":{"type":"string"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLAlibaba":{"description":"advisory.EOLAlibaba","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"eol_date":{"type":"string"},"eol_name":{"type":"string"},"product":{"type":"string"},"release_date":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.EOLMicrosoft":{"description":"advisory.EOLMicrosoft","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"edition":{"type":"string"},"extended_end_date":{"type":"string"},"mainstream_date":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"release_end_date":{"type":"string"},"release_start_date":{"type":"string"},"retirement_date":{"type":"string"},"start_date":{"type":"string"},"support_policy":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLReleaseData":{"description":"advisory.EOLReleaseData","properties":{"already_eol":{"type":"boolean"},"branch":{"description":"Alpine Linux","type":"string"},"branch_url":{"description":"Alpine Linux","type":"string"},"codename":{"type":"string"},"cpe":{"type":"string"},"eol_date":{"type":"string"},"eol_date_extended_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_date_premier_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_elts_date":{"type":"string"},"eol_lts_date":{"type":"string"},"git_branch":{"description":"Alpine Linux","type":"string"},"git_branch_url":{"description":"Alpine Linux","type":"string"},"lts":{"description":"Ubuntu","type":"boolean"},"minor_releases":{"description":"Alpine Linux","items":{"type":"string"},"type":"array","uniqueItems":false},"product":{"type":"string"},"release_date":{"type":"string"},"release_name":{"type":"string"},"source_url":{"type":"string"},"technology_level":{"description":"AIX","type":"string"},"vendor":{"type":"string"},"version":{"type":"string"},"version_api":{"description":"Android","type":"string"},"version_darwin":{"description":"macOS","type":"string"},"version_sunos":{"description":"Solaris","type":"string"},"windows_current_build":{"description":"Microsoft Windows","type":"string"},"windows_display_version":{"description":"Microsoft Windows","type":"string"},"windows_edition_id":{"description":"Microsoft Windows","type":"string"},"windows_insider_preview":{"description":"Microsoft Windows","type":"boolean"}},"type":"object"},"advisory.EUVD":{"description":"advisory.EUVD","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"assigner":{"type":"string"},"base_score":{"type":"number"},"base_score_vector":{"type":"string"},"base_score_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"enisa_id_product":{"items":{"$ref":"#/components/schemas/advisory.EnisaIDProduct"},"type":"array","uniqueItems":false},"enisa_id_vendor":{"items":{"$ref":"#/components/schemas/advisory.EnisaIDVendor"},"type":"array","uniqueItems":false},"epss":{"type":"number"},"exploited":{"description":"This field is exploited field from endpoint /api/vulnerabilities.\napidocs : https://euvd.enisa.europa.eu/apidoc\nNote: There are records where exploited_since is populated with a valid date,\nbut it still shows up under non_exploitable data set","type":"boolean"},"exploited_since":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.EatonAdvisory":{"description":"advisory.EatonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"eaton_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EcoSystem":{"description":"advisory.EcoSystem","properties":{"severity":{"type":"string"},"spl":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Elastic":{"description":"advisory.Elastic","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"esaid":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Elspec":{"description":"advisory.Elspec","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmergingThreatsSnort":{"description":"advisory.EmergingThreatsSnort","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"rev":{"type":"string"},"rule_disabled":{"type":"boolean"},"rule_name":{"type":"string"},"sid":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmersonAdvisory":{"description":"advisory.EmersonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"emerson_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EndOfLife":{"description":"advisory.EndOfLife","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cycles":{"items":{"$ref":"#/components/schemas/advisory.Cycle"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Endress":{"description":"advisory.Endress","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EnisaIDProduct":{"description":"advisory.EnisaIDProduct","properties":{"id":{"type":"string"},"product_name":{"type":"string"},"product_version":{"type":"string"}},"type":"object"},"advisory.EnisaIDVendor":{"description":"advisory.EnisaIDVendor","properties":{"id":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.Event":{"description":"advisory.Event","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"},"last_affected":{"type":"string"},"limit":{"type":"string"}},"type":"object"},"advisory.ExodusIntel":{"description":"advisory.ExodusIntel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"disclosed_public":{"type":"string"},"disclosed_vendor":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExploitDBExploitv2":{"description":"advisory.ExploitDBExploitv2","properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"edb_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExternalReferences":{"description":"advisory.ExternalReferences","properties":{"description":{"type":"string"},"external_id":{"type":"string"},"source_name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.F5":{"description":"advisory.F5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FSecure":{"description":"advisory.FSecure","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fanuc":{"description":"advisory.Fanuc","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fastly":{"description":"advisory.Fastly","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Festo":{"description":"advisory.Festo","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileCloud":{"description":"advisory.FileCloud","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileZilla":{"description":"advisory.FileZilla","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FixAff":{"description":"advisory.FixAff","properties":{"affected_since":{"type":"string"},"fixed_version":{"type":"string"},"patch_url":{"type":"string"}},"type":"object"},"advisory.Flag":{"description":"advisory.Flag","properties":{"date":{"type":"string"},"group_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"label":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.FlattSecurity":{"description":"advisory.FlattSecurity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ForgeRock":{"description":"advisory.ForgeRock","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FortinetAdvisory":{"description":"advisory.FortinetAdvisory","properties":{"acknowledgement":{"type":"string"},"affectedProducts":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvssv3":{"type":"string"},"date_added":{"type":"string"},"irnumber":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solutions":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.FortinetIPS":{"description":"advisory.FortinetIPS","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"epss":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Foxit":{"description":"advisory.Foxit","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.FoxitAffected"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FoxitAffected":{"description":"advisory.FoxitAffected","properties":{"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Fresenius":{"description":"advisory.Fresenius","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GCP":{"description":"advisory.GCP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEGas":{"description":"advisory.GEGas","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEHealthcareAdvisory":{"description":"advisory.GEHealthcareAdvisory","properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHAdvisoryJSONLean":{"description":"advisory.GHAdvisoryJSONLean","properties":{"classification":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"$ref":"#/components/schemas/advisory.GHCvss"},"cwes":{"$ref":"#/components/schemas/advisory.Cwes"},"databaseId":{"type":"integer"},"date_added":{"type":"string"},"description":{"type":"string"},"ghsaId":{"type":"string"},"id":{"type":"string"},"identifiers":{"items":{"$ref":"#/components/schemas/advisory.GHIdentifier"},"type":"array","uniqueItems":false},"notificationsPermalink":{"type":"string"},"origin":{"type":"string"},"permalink":{"type":"string"},"publishedAt":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GHReference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"vulnerabilities":{"$ref":"#/components/schemas/advisory.GHVulnerabilities"},"withdrawnAt":{"type":"string"}},"type":"object"},"advisory.GHCvss":{"description":"advisory.GHCvss","properties":{"score":{"type":"number"},"vectorString":{"type":"string"}},"type":"object"},"advisory.GHIdentifier":{"description":"advisory.GHIdentifier","properties":{"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.GHNode":{"description":"advisory.GHNode","properties":{"package":{"$ref":"#/components/schemas/advisory.GHPackage"},"severity":{"type":"string"},"updatedAt":{"type":"string"},"vulnerableVersionRange":{"type":"string"}},"type":"object"},"advisory.GHPackage":{"description":"advisory.GHPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHReference":{"description":"advisory.GHReference","properties":{"url":{"type":"string"}},"type":"object"},"advisory.GHSA":{"description":"advisory.GHSA","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"ghsa":{"$ref":"#/components/schemas/advisory.OriginalGHSA"},"url":{"type":"string"}},"type":"object"},"advisory.GHSAAffected":{"description":"advisory.GHSAAffected","properties":{"ecosystem_specific":{"$ref":"#/components/schemas/advisory.GHSAEcoSystemSpecific"},"package":{"$ref":"#/components/schemas/advisory.GHSAPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.GHSARange"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GHSADatabaseSpecific":{"description":"advisory.GHSADatabaseSpecific","properties":{"cwe_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"github_reviewed":{"type":"boolean"},"github_reviewed_at":{"type":"string"},"nvd_published_at":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.GHSAEcoSystemSpecific":{"description":"advisory.GHSAEcoSystemSpecific","properties":{"affected_functions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GHSAEvent":{"description":"advisory.GHSAEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GHSAPackage":{"description":"advisory.GHSAPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHSARange":{"description":"advisory.GHSARange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.GHSAEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.GHSAReference":{"description":"advisory.GHSAReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHSASeverity":{"description":"advisory.GHSASeverity","properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.GHVulnerabilities":{"description":"advisory.GHVulnerabilities","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.GHNode"},"type":"array","uniqueItems":false},"totalCount":{"type":"integer"}},"type":"object"},"advisory.GMOCyberSecurity":{"description":"advisory.GMOCyberSecurity","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gallagher":{"description":"advisory.Gallagher","properties":{"activeExploitation":{"type":"boolean"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixes":{"type":"string"},"reportedBy":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gen":{"description":"advisory.Gen","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"description":"not all of them have this","type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Genetec":{"description":"advisory.Genetec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gigabyte":{"description":"advisory.Gigabyte","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.GitHubExploit":{"description":"advisory.GitHubExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"currently_trending":{"type":"boolean"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"id":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitLabExploit":{"description":"advisory.GitLabExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GiteeExploit":{"description":"advisory.GiteeExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitlabAdvisory":{"description":"advisory.GitlabAdvisory","properties":{"affected_range":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v2":{"type":"string"},"cvss_v3":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"fixed_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ghsa":{"items":{"type":"string"},"type":"array","uniqueItems":false},"gitlab_url":{"type":"string"},"identifier":{"type":"string"},"identifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"not_impacted":{"type":"string"},"package_manager":{"type":"string"},"package_name":{"type":"string"},"package_slug":{"type":"string"},"pubdate":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"uuid":{"type":"string"}},"type":"object"},"advisory.Glibc":{"description":"advisory.Glibc","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GnuTLS":{"description":"advisory.GnuTLS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GoCredits":{"description":"advisory.GoCredits","properties":{"name":{"type":"string"}},"type":"object"},"advisory.GoEvent":{"description":"advisory.GoEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GoVulnAffected":{"description":"advisory.GoVulnAffected","properties":{"database_specific":{"$ref":"#/components/schemas/advisory.GoVulnDatabaseSpecific"},"ecosystem_specific":{"$ref":"#/components/schemas/advisory.GoVulnEcosystemSpecific"},"package":{"$ref":"#/components/schemas/advisory.GoVulnPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.GoVulnRanges"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnDatabaseSpecific":{"description":"advisory.GoVulnDatabaseSpecific","properties":{"url":{"type":"string"}},"type":"object"},"advisory.GoVulnEcosystemSpecific":{"description":"advisory.GoVulnEcosystemSpecific","properties":{"imports":{"items":{"$ref":"#/components/schemas/advisory.GoVulnImport"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnImport":{"description":"advisory.GoVulnImport","properties":{"path":{"type":"string"},"symbols":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnJSON":{"description":"advisory.GoVulnJSON","properties":{"advisory_url":{"type":"string"},"affected":{"items":{"$ref":"#/components/schemas/advisory.GoVulnAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.GoCredits"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"ghsa":{"items":{"type":"string"},"type":"array","uniqueItems":false},"go_advisory_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GoVulnReference"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnPackage":{"description":"advisory.GoVulnPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GoVulnRanges":{"description":"advisory.GoVulnRanges","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.GoEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.GoVulnReference":{"description":"advisory.GoVulnReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Grafana":{"description":"advisory.Grafana","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseDetection":{"description":"advisory.GreyNoiseDetection","properties":{"category":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"label":{"type":"string"},"name":{"type":"string"},"recommend_block":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"related_tags":{"items":{"$ref":"#/components/schemas/advisory.GreyNoiseTags"},"type":"array","uniqueItems":false},"slug":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseTags":{"description":"advisory.GreyNoiseTags","properties":{"category":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"name":{"type":"string"},"slug":{"type":"string"}},"type":"object"},"advisory.HCL":{"description":"advisory.HCL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HIKVision":{"description":"advisory.HIKVision","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.HKCert":{"description":"advisory.HKCert","properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"relatedLinks":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"solutions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.HMS":{"description":"advisory.HMS","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HP":{"description":"advisory.HP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.HPE":{"description":"advisory.HPE","properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hacktivity":{"description":"advisory.Hacktivity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"float64":{"type":"number"},"rank":{"type":"integer"},"reports_submitted":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HardwareUpdate":{"description":"advisory.HardwareUpdate","properties":{"affectedVersions":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"hardwarePlatform":{"type":"string"},"system":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.HarmonyOS":{"description":"advisory.HarmonyOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HashiCorp":{"description":"advisory.HashiCorp","properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HaskellAffected":{"description":"advisory.HaskellAffected","properties":{"affected_constraint":{"type":"string"},"affected_versions":{"items":{"$ref":"#/components/schemas/advisory.HaskellVersion"},"type":"array","uniqueItems":false},"arch":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"os":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package":{"type":"string"}},"type":"object"},"advisory.HaskellSADBAdvisory":{"description":"advisory.HaskellSADBAdvisory","properties":{"advisory_id":{"type":"string"},"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.HaskellAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"integer"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"keywords":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"type":"object"},"related_vulns":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"}},"type":"object"},"advisory.HaskellVersion":{"description":"advisory.HaskellVersion","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.HillromAdvisory":{"description":"advisory.HillromAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hitachi":{"description":"advisory.Hitachi","properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixedProducts":{"type":"string"},"hitachiId":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HitachiEnergy":{"description":"advisory.HitachiEnergy","properties":{"advisory_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploited":{"type":"boolean"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Honeywell":{"description":"advisory.Honeywell","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Huawei":{"description":"advisory.Huawei","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"sa_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiEulerOS":{"description":"advisory.HuaweiEulerOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"packages":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"synopsis":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiIPS":{"description":"advisory.HuaweiIPS","properties":{"cnnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"name":{"type":"string"},"severity":{"type":"string"},"threat_id":{"type":"integer"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.IAVA":{"description":"advisory.IAVA","properties":{"IAVA":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.IBM":{"description":"advisory.IBM","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ITW":{"description":"advisory.ITW","properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.ITWExploit":{"description":"advisory.ITWExploit","properties":{"advisory":{"type":"string"},"affected_versions":{"type":"string"},"analysis_url":{"type":"string"},"bug_introducing_change_list_url":{"type":"string"},"claimed_attribution":{"type":"string"},"claimed_attribution_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_discovered":{"type":"string"},"date_patched":{"type":"string"},"description":{"type":"string"},"first_patched_version":{"type":"string"},"patch_change_list_url":{"type":"string"},"product":{"type":"string"},"reported_by":{"type":"string"},"root_cause_analysis_url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_type":{"type":"string"}},"type":"object"},"advisory.IVal":{"description":"advisory.IVal","properties":{"Value":{"type":"string"}},"type":"object"},"advisory.Idemia":{"description":"advisory.Idemia","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"sbid":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IdentificationHelper":{"additionalProperties":{},"description":"advisory.IdentificationHelper","type":"object"},"advisory.Igel":{"description":"advisory.Igel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Impact":{"description":"advisory.Impact","properties":{"capecId":{"type":"string"},"descriptions":{"items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.IncibeAdvisory":{"description":"advisory.IncibeAdvisory","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"detail":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Intel":{"description":"advisory.Intel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.IpIntelRecord":{"description":"advisory.IpIntelRecord","properties":{"asn":{"type":"string"},"city":{"type":"string"},"country":{"type":"string"},"country_code":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"feed_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"hostnames":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ip":{"type":"string"},"lastSeen":{"type":"string"},"matches":{"items":{"type":"string"},"type":"array","uniqueItems":false},"port":{"type":"integer"},"ssl":{"type":"boolean"},"type":{"$ref":"#/components/schemas/advisory.RecordType"}},"type":"object"},"advisory.IsraeliAlert":{"description":"advisory.IsraeliAlert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details_he":{"type":"string"},"handling_he":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_he":{"type":"string"},"title_he":{"type":"string"}},"type":"object"},"advisory.IsraeliVulnerability":{"description":"advisory.IsraeliVulnerability","properties":{"ILVNId":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Issued":{"description":"advisory.Issued","type":"object"},"advisory.Istio":{"description":"advisory.Istio","properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ivanti":{"description":"advisory.Ivanti","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IvantiRSS":{"description":"advisory.IvantiRSS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JFrog":{"description":"advisory.JFrog","properties":{"cpes":{"items":{"$ref":"#/components/schemas/advisory.NVD20CVECPEMatch"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"product":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.JNJAdvisory":{"description":"advisory.JNJAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVN":{"description":"advisory.JVN","properties":{"affected_en":{"type":"string"},"affected_ja":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_en":{"type":"string"},"description_ja":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"solution_en":{"type":"string"},"solution_ja":{"type":"string"},"summary_en":{"type":"string"},"summary_ja":{"type":"string"},"title_en":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVNAdvisoryItem":{"description":"advisory.JVNAdvisoryItem","properties":{"cpe":{"items":{"$ref":"#/components/schemas/advisory.JVNCPE"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"items":{"$ref":"#/components/schemas/advisory.CVSS"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"description_en":{"type":"string"},"identifier":{"type":"string"},"issued":{"type":"string"},"modified":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.JVNReference"},"type":"array","uniqueItems":false},"title":{"type":"string"},"title_en":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"url_en":{"type":"string"}},"type":"object"},"advisory.JVNCPE":{"description":"advisory.JVNCPE","properties":{"cpe":{"type":"string"},"product":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.JVNReference":{"description":"advisory.JVNReference","properties":{"id":{"type":"string"},"source":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Jenkins":{"description":"advisory.Jenkins","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fix":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.JetBrains":{"description":"advisory.JetBrains","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"resolved_in":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JohnsonControls":{"description":"advisory.JohnsonControls","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Juniper":{"description":"advisory.Juniper","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss3_score":{"type":"string"},"cvss3_vector":{"type":"string"},"cvss4_score":{"type":"string"},"cvss4_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.K8S":{"description":"advisory.K8S","properties":{"content":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issue_id":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.KEVCatalogVulnerability":{"description":"advisory.KEVCatalogVulnerability","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"notes":{"type":"string"},"product":{"type":"string"},"requiredAction":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.KRCertAdvisory":{"description":"advisory.KRCertAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_ko":{"type":"string"},"link":{"type":"string"},"overview_ko":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title_ko":{"type":"string"}},"type":"object"},"advisory.KasperskyICSCERTAdvisory":{"description":"advisory.KasperskyICSCERTAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"klcert_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kb":{"description":"advisory.Kb","properties":{"kb_url":{"type":"string"},"ms_date_added":{"type":"string"},"status":{"type":"string"},"supercedence":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.KbThreatDescription":{"description":"advisory.KbThreatDescription","properties":{"dos":{"type":"string"},"exploited":{"type":"string"},"latest_software_release":{"type":"string"},"level":{"items":{"type":"string"},"type":"array","uniqueItems":false},"older_software_release":{"type":"string"},"publicly_disclosed":{"type":"string"},"type":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.KoreLogic":{"description":"advisory.KoreLogic","properties":{"affected_product":{"type":"string"},"affected_vendor":{"type":"string"},"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kunbus":{"description":"advisory.Kunbus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LG":{"description":"advisory.LG","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lantronix":{"description":"advisory.Lantronix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lenovo":{"description":"advisory.Lenovo","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"industry_identifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"last_updated":{"type":"string"},"lenovo_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LexmarkAdvisory":{"description":"advisory.LexmarkAdvisory","properties":{"affectedProducts":{"items":{"$ref":"#/components/schemas/advisory.AffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"impact":{"type":"string"},"lastUpdate":{"type":"string"},"link":{"type":"string"},"publicReleaseDate":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"revision":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"workarounds":{"type":"string"}},"type":"object"},"advisory.LibreOffice":{"description":"advisory.LibreOffice","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Linux":{"description":"advisory.Linux","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LogSource":{"description":"advisory.LogSource","properties":{"category":{"type":"string"},"definition":{"type":"string"},"product":{"type":"string"},"service":{"type":"string"}},"type":"object"},"advisory.LolAdvs":{"description":"advisory.LolAdvs","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"lol_json":{"additionalProperties":{},"type":"object"},"mitre_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MACert":{"description":"advisory.MACert","properties":{"affected_systems_fr":{"type":"string"},"assessment_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact_fr":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"title_fr":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MAffected":{"description":"advisory.MAffected","properties":{"collectionURL":{"type":"string"},"cpes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"defaultStatus":{"type":"string"},"packageName":{"type":"string"},"packageURL":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product":{"type":"string"},"repo":{"type":"string"},"vendor":{"type":"string"},"versions":{"items":{"$ref":"#/components/schemas/advisory.MVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MBranch":{"description":"advisory.MBranch","properties":{"Branch":{"items":{"$ref":"#/components/schemas/advisory.MBranch"},"type":"array","uniqueItems":false},"FullProductName":{"items":{"$ref":"#/components/schemas/advisory.MFullProductName"},"type":"array","uniqueItems":false},"Items":{"items":{"$ref":"#/components/schemas/advisory.MItem"},"type":"array","uniqueItems":false},"name":{"type":"string"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MCPEApplicability":{"description":"advisory.MCPEApplicability","properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/components/schemas/advisory.MNodes"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"advisory.MCPEMatch":{"description":"advisory.MCPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.MCna":{"description":"advisory.MCna","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"cpeApplicability":{"items":{"$ref":"#/components/schemas/advisory.CustomCPE"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.Credit"},"type":"array","uniqueItems":false},"descriptions":{"items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false},"impacts":{"items":{"$ref":"#/components/schemas/advisory.Impact"},"type":"array","uniqueItems":false},"metrics":{"items":{"$ref":"#/components/schemas/advisory.Metric"},"type":"array","uniqueItems":false},"problemTypes":{"items":{"$ref":"#/components/schemas/advisory.MProblemTypes"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/components/schemas/advisory.MReference"},"type":"array","uniqueItems":false},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"timeline":{"items":{"$ref":"#/components/schemas/advisory.Timeline"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.MContainers":{"description":"advisory.MContainers","properties":{"adp":{"items":{"$ref":"#/components/schemas/advisory.ADPContainer"},"type":"array","uniqueItems":false},"cna":{"$ref":"#/components/schemas/advisory.MCna"}},"type":"object"},"advisory.MCveMetadata":{"description":"advisory.MCveMetadata","properties":{"assignerOrgId":{"type":"string"},"assignerShortName":{"type":"string"},"cveId":{"type":"string"},"datePublished":{"type":"string"},"dateReserved":{"type":"string"},"dateUpdated":{"type":"string"},"state":{"type":"string"}},"type":"object"},"advisory.MCvssV20":{"description":"advisory.MCvssV20","properties":{"accessVector":{"type":"string"},"attackComplexity":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV30":{"description":"advisory.MCvssV30","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV31":{"description":"advisory.MCvssV31","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV40":{"description":"advisory.MCvssV40","properties":{"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"automatable":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"recovery":{"type":"string"},"safety":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.MDescriptions":{"description":"advisory.MDescriptions","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MDocumentTracking":{"description":"advisory.MDocumentTracking","properties":{"CurrentReleaseDate":{"type":"string"},"InitialReleaseDate":{"type":"string"},"identification":{"$ref":"#/components/schemas/advisory.MIdentification"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/components/schemas/advisory.RRevision"},"type":"array","uniqueItems":false},"status":{"description":"again - change in json/xml","type":"integer"},"version":{"type":"string"}},"type":"object"},"advisory.MEProduct":{"description":"advisory.MEProduct","properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.MFiles":{"description":"advisory.MFiles","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MFullProductName":{"description":"advisory.MFullProductName","properties":{"CPE":{"type":"string"},"ProductID":{"type":"string"},"Value":{"type":"string"}},"type":"object"},"advisory.MISPValueNoID":{"description":"advisory.MISPValueNoID","properties":{"description":{"type":"string"},"meta":{"$ref":"#/components/schemas/advisory.MispMeta"},"related":{"items":{"$ref":"#/components/schemas/advisory.MispRelatedItem"},"type":"array","uniqueItems":false},"value":{"type":"string"}},"type":"object"},"advisory.MITREAttackGroupNoID":{"description":"advisory.MITREAttackGroupNoID","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"name":{"type":"string"},"techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechnique"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MIdentification":{"description":"advisory.MIdentification","properties":{"alias":{"$ref":"#/components/schemas/advisory.IVal"},"id":{"$ref":"#/components/schemas/advisory.IVal"}},"type":"object"},"advisory.MItem":{"description":"advisory.MItem","properties":{"Items":{"items":{"$ref":"#/components/schemas/advisory.MItem"},"type":"array","uniqueItems":false},"Name":{"type":"string"},"ProductID":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Value":{"type":"string"}},"type":"object"},"advisory.MNodes":{"description":"advisory.MNodes","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.MCPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.MProblemTypes":{"description":"advisory.MProblemTypes","properties":{"descriptions":{"items":{"$ref":"#/components/schemas/advisory.PTMDescriptions"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MProductStatus":{"description":"advisory.MProductStatus","properties":{"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MProductTree":{"description":"advisory.MProductTree","properties":{"Branch":{"items":{"$ref":"#/components/schemas/advisory.MBranch"},"type":"array","uniqueItems":false},"FullProductName":{"items":{"$ref":"#/components/schemas/advisory.MFullProductName"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MProviderMetadata":{"description":"OK","properties":{"dateUpdated":{"description":"FIXME: flip to time","type":"string"},"orgId":{"type":"string"},"shortName":{"type":"string"}},"type":"object"},"advisory.MReference":{"description":"advisory.MReference","properties":{"name":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.MRemediation":{"description":"advisory.MRemediation","properties":{"AffectedFiles":{"items":{"$ref":"#/components/schemas/advisory.AffectedFile"},"type":"array","uniqueItems":false},"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/components/schemas/advisory.IVal"},"FixedBuild":{"type":"string"},"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"RestartRequired":{"$ref":"#/components/schemas/advisory.IVal"},"SubType":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Url":{"type":"string"},"supercedence":{"type":"string"}},"type":"object"},"advisory.MSCVRF":{"description":"advisory.MSCVRF","properties":{"DocumentTitle":{"$ref":"#/components/schemas/advisory.MSDocumentTitle"},"DocumentTracking":{"$ref":"#/components/schemas/advisory.MDocumentTracking"},"ProductTree":{"$ref":"#/components/schemas/advisory.MProductTree"},"document_type":{"type":"string"},"documentnotes":{"description":"diff","items":{"$ref":"#/components/schemas/advisory.RNote"},"type":"array","uniqueItems":false},"documentpublisher":{"$ref":"#/components/schemas/advisory.DocumentPublisher"},"vulnerability":{"items":{"$ref":"#/components/schemas/advisory.MVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MSDocumentTitle":{"description":"advisory.MSDocumentTitle","properties":{"Value":{"type":"string"}},"type":"object"},"advisory.MVersion":{"description":"advisory.MVersion","properties":{"lessThan":{"type":"string"},"lessThanOrEqual":{"type":"string"},"status":{"type":"string"},"version":{"type":"string"},"versionType":{"type":"string"}},"type":"object"},"advisory.MVulnerability":{"description":"advisory.MVulnerability","properties":{"ProductStatuses":{"items":{"$ref":"#/components/schemas/advisory.MProductStatus"},"type":"array","uniqueItems":false},"Remediations":{"items":{"$ref":"#/components/schemas/advisory.MRemediation"},"type":"array","uniqueItems":false},"Threats":{"items":{"$ref":"#/components/schemas/advisory.RThreat"},"type":"array","uniqueItems":false},"acknowledgments":{"items":{"$ref":"#/components/schemas/advisory.Acknowledgement"},"type":"array","uniqueItems":false},"cve":{"type":"string"},"cvssscoresets":{"items":{"$ref":"#/components/schemas/advisory.RScoreSet"},"type":"array","uniqueItems":false},"notes":{"items":{"$ref":"#/components/schemas/advisory.Note"},"type":"array","uniqueItems":false},"ordinal":{"type":"string"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/components/schemas/advisory.RRevision"},"type":"array","uniqueItems":false},"title":{"$ref":"#/components/schemas/advisory.IVal"}},"type":"object"},"advisory.MaliciousPackage":{"description":"advisory.MaliciousPackage","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"malware":{"$ref":"#/components/schemas/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MaliciousVSCodeExts":{"description":"advisory.MaliciousVSCodeExts","properties":{"date_added":{"type":"string"},"name":{"type":"string"},"publisher":{"type":"string"},"type":{"type":"string"},"updated_at":{"description":"the data in this feed comes from manual curation. so this will likely be omitted.","type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.ManageEngine":{"description":"advisory.ManageEngine","properties":{"ADVISORY":{"type":"string"},"Added_Time":{"type":"string"},"CVE_Details_Link":{"$ref":"#/components/schemas/advisory.CVEDetailsLink"},"CVE_ID":{"type":"string"},"CVSS_Severity_Rating":{"type":"string"},"Fixed":{"type":"string"},"For_product_search":{"type":"string"},"ID":{"type":"string"},"Product":{"$ref":"#/components/schemas/advisory.MEProduct"},"Product_list":{"items":{"$ref":"#/components/schemas/advisory.MEProduct"},"type":"array","uniqueItems":false},"Product_specific_details":{"items":{"$ref":"#/components/schemas/advisory.ProductSpecificDetail"},"type":"array","uniqueItems":false},"Summary":{"type":"string"},"Version":{"type":"string"},"index_field":{"type":"string"}},"type":"object"},"advisory.ManageEngineAdvisory":{"description":"advisory.ManageEngineAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"manage_engine":{"$ref":"#/components/schemas/advisory.ManageEngine"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MbedTLS":{"description":"advisory.MbedTLS","properties":{"affects":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfee":{"description":"advisory.McAfee","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mcafee_score":{"items":{"$ref":"#/components/schemas/advisory.McAfeeScore"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfeeScore":{"description":"advisory.McAfeeScore","properties":{"base":{"type":"string"},"cve":{"type":"string"},"temporal":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.Mediatek":{"description":"advisory.Mediatek","properties":{"affected_chipsets":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_software":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MedtronicAdvisory":{"description":"advisory.MedtronicAdvisory","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mendix":{"description":"advisory.Mendix","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"mendix_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaAdvisories":{"description":"advisory.MetaAdvisories","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaData":{"description":"advisory.MetaData","properties":{"advisory":{"$ref":"#/components/schemas/advisory.AdvisoryDetails"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckPackage"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.OvalReference"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.MetasploitExploit":{"description":"advisory.MetasploitExploit","properties":{"author":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Metric":{"description":"advisory.Metric","properties":{"cvssV2_0":{"$ref":"#/components/schemas/advisory.MCvssV20"},"cvssV3_0":{"$ref":"#/components/schemas/advisory.MCvssV30"},"cvssV3_1":{"$ref":"#/components/schemas/advisory.MCvssV31"},"cvssV4_0":{"$ref":"#/components/schemas/advisory.MCvssV40"},"format":{"type":"string"},"other":{"$ref":"#/components/schemas/advisory.MetricsOther"},"scenarios":{"items":{"$ref":"#/components/schemas/advisory.MetricScenario"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MetricScenario":{"description":"advisory.MetricScenario","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MetricsOther":{"description":"advisory.MetricsOther","properties":{"content":{"type":"object"},"type":{"type":"string"}},"type":"object"},"advisory.MicrosoftCSAF":{"description":"advisory.MicrosoftCSAF","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftCVRF":{"description":"advisory.MicrosoftCVRF","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf":{"$ref":"#/components/schemas/advisory.MSCVRF"},"date_added":{"type":"string"},"exploited_list":{"items":{"$ref":"#/components/schemas/advisory.ITW"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftDriverBlockList":{"description":"advisory.MicrosoftDriverBlockList","properties":{"date_added":{"type":"string"},"file_id":{"description":"From FileAttrib or Deny","type":"string"},"file_metadata":{"$ref":"#/components/schemas/advisory.MicrosoftFileMetadata"}},"type":"object"},"advisory.MicrosoftFileMetadata":{"description":"File-level metadata","properties":{"file_name":{"description":"Full path (FilePath + FileName or FriendlyName)","type":"string"},"maximum_file_version":{"type":"string"},"minimum_file_version":{"type":"string"},"product_name":{"type":"string"},"sha1_hash":{"type":"string"},"sha256_hash":{"type":"string"}},"type":"object"},"advisory.MicrosoftKb":{"description":"advisory.MicrosoftKb","properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"kbs":{"items":{"$ref":"#/components/schemas/advisory.Kb"},"type":"array","uniqueItems":false},"threat":{"$ref":"#/components/schemas/advisory.KbThreatDescription"},"title":{"type":"string"}},"type":"object"},"advisory.Mikrotik":{"description":"advisory.Mikrotik","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mindray":{"description":"advisory.Mindray","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MispMeta":{"description":"advisory.MispMeta","properties":{"attribution-confidence":{"type":"string"},"cfr-suspected-state-sponsor":{"type":"string"},"cfr-suspected-victims":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cfr-target-category":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cfr-type-of-incident":{"items":{"type":"string"},"type":"array","uniqueItems":false},"country":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"synonyms":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MispRelatedItem":{"description":"advisory.MispRelatedItem","properties":{"dest-uuid":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.MispValue":{"description":"advisory.MispValue","properties":{"description":{"type":"string"},"meta":{"$ref":"#/components/schemas/advisory.MispMeta"},"related":{"items":{"$ref":"#/components/schemas/advisory.MispRelatedItem"},"type":"array","uniqueItems":false},"uuid":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Mitel":{"description":"advisory.Mitel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackRef":{"description":"advisory.MitreAttackRef","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechWithRefs":{"description":"advisory.MitreAttackTechWithRefs","properties":{"domain":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"},"nist_controls":{"items":{"$ref":"#/components/schemas/advisory.NISTControl"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackRef"},"type":"array","uniqueItems":false},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechnique":{"description":"advisory.MitreAttackTechnique","properties":{"sub_technique":{"type":"string"},"sub_technique_name":{"type":"string"},"tactic":{"items":{"type":"string"},"type":"array","uniqueItems":false},"technique_id":{"type":"string"},"technique_name":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5":{"description":"advisory.MitreCVEListV5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5Ref":{"description":"advisory.MitreCVEListV5Ref","properties":{"containers":{"$ref":"#/components/schemas/advisory.MContainers"},"cveMetadata":{"$ref":"#/components/schemas/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.MitreGroupCTI":{"description":"advisory.MitreGroupCTI","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.ExternalReferences"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MitsubishiElectricAdvisory":{"description":"advisory.MitsubishiElectricAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"description":"could nuke this at some pt in the future as it's a dupe","type":"string"},"mitsubishi_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MongoDB":{"description":"advisory.MongoDB","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MoxaAdvisory":{"description":"advisory.MoxaAdvisory","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaAdvisory":{"description":"advisory.MozillaAdvisory","properties":{"affected_components":{"items":{"$ref":"#/components/schemas/advisory.MozillaComponent"},"type":"array","uniqueItems":false},"bugzilla":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_in":{"items":{"type":"string"},"type":"array","uniqueItems":false},"impact":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"reporter":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaComponent":{"description":"advisory.MozillaComponent","properties":{"bugzilla":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"impact":{"type":"string"},"reporter":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.NCSC":{"description":"advisory.NCSC","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NCSCCVE":{"description":"advisory.NCSCCVE","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NEC":{"description":"advisory.NEC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"nvd_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NHS":{"description":"advisory.NHS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"summary":{"type":"string"},"threat_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NI":{"description":"advisory.NI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"ovewrview":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NISTControl":{"description":"advisory.NISTControl","properties":{"cis_controls":{"items":{"$ref":"#/components/schemas/advisory.CISControl"},"type":"array","uniqueItems":false},"nist_control_family":{"type":"string"},"nist_control_id":{"type":"string"},"nist_control_name":{"type":"string"}},"type":"object"},"advisory.NTP":{"description":"advisory.NTP","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NVD20CVECPEMatch":{"description":"advisory.NVD20CVECPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.NVD20Configuration":{"description":"advisory.NVD20Configuration","properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/components/schemas/advisory.NVD20Node"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Node":{"description":"advisory.NVD20Node","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.NVD20CVECPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Source":{"description":"advisory.NVD20Source","properties":{"contactEmail":{"type":"string"},"created":{"type":"string"},"cweAcceptanceLevel":{"$ref":"#/components/schemas/advisory.CweAcceptanceLevel"},"lastModified":{"type":"string"},"name":{"type":"string"},"sourceIdentifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"v3AcceptanceLevel":{"$ref":"#/components/schemas/advisory.V3AcceptanceLevel"}},"type":"object"},"advisory.NVDCPEDictionary":{"description":"advisory.NVDCPEDictionary","properties":{"backupOnly":{"type":"string"}},"type":"object"},"advisory.NZAdvisory":{"description":"advisory.NZAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"happening":{"type":"string"},"link":{"type":"string"},"lookFor":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"whatToDo":{"type":"string"}},"type":"object"},"advisory.Naver":{"description":"advisory.Naver","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nessus":{"description":"advisory.Nessus","properties":{"cpe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploitability_ease":{"description":"seems like only 3 vals for this","type":"string"},"filename":{"type":"string"},"iava":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"script_id":{"type":"integer"},"updated":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NetApp":{"description":"advisory.NetApp","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact":{"type":"string"},"ntap":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netatalk":{"description":"advisory.Netatalk","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgate":{"description":"advisory.Netgate","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgear":{"description":"advisory.Netgear","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"psvn_number":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netskope":{"description":"advisory.Netskope","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nexpose":{"description":"advisory.Nexpose","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"identifier":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NginxAdvisory":{"description":"advisory.NginxAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"not_vuln_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false},"patch_pgp":{"type":"string"},"patch_url":{"type":"string"},"severity":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vuln_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.NodeAuthor":{"description":"advisory.NodeAuthor","properties":{"author":{"type":"string"},"username":{"type":"string"},"website":{"type":"string"}},"type":"object"},"advisory.NodeJS":{"description":"advisory.NodeJS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NodeSecurity":{"description":"advisory.NodeSecurity","properties":{"affected_environments":{"items":{"type":"string"},"type":"array","uniqueItems":false},"author":{"$ref":"#/components/schemas/advisory.NodeAuthor"},"coordinating_vendor":{"type":"string"},"created_at":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"number"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"module_name":{"type":"string"},"overview":{"type":"string"},"patched_versions":{"type":"string"},"publish_date":{"type":"string"},"recommendation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerable_versions":{"type":"string"}},"type":"object"},"advisory.Nokia":{"description":"advisory.Nokia","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Note":{"description":"advisory.Note","properties":{"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"integer"}},"type":"object"},"advisory.NotePadPlusPlus":{"description":"advisory.NotePadPlusPlus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nozomi":{"description":"advisory.Nozomi","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nuclei":{"description":"advisory.Nuclei","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"template":{"type":"object"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NvidiaRevision":{"description":"advisory.NvidiaRevision","properties":{"date":{"type":"string"},"description":{"type":"string"},"revision":{"type":"string"}},"type":"object"},"advisory.OCurl":{"description":"advisory.OCurl","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.CurlAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.CurlCredit"},"type":"array","uniqueItems":false},"database_specific":{"$ref":"#/components/schemas/advisory.DBSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"schema_version":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.OSV":{"description":"advisory.OSV","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"osv":{"$ref":"#/components/schemas/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OSVObj":{"description":"advisory.OSVObj","properties":{"affected":{"description":"collection based on https://ossf.github.io/osv-schema/","items":{"$ref":"#/components/schemas/advisory.Affected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.OSVReference"},"type":"array","uniqueItems":false},"related":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"withdrawn":{"type":"string"}},"type":"object"},"advisory.OSVPackage":{"description":"advisory.OSVPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.OSVReference":{"description":"advisory.OSVReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OTRS":{"description":"advisory.OTRS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OctopusDeploy":{"description":"advisory.OctopusDeploy","properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Okta":{"description":"advisory.Okta","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"resolution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Omron":{"description":"advisory.Omron","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OneE":{"description":"advisory.OneE","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenBSD":{"description":"advisory.OpenBSD","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"patch":{"type":"string"},"release":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenCVDB":{"description":"advisory.OpenCVDB","properties":{"affected_platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_services":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"disclosed_at":{"type":"string"},"known_itw_exploitation":{"type":"boolean"},"manual_remediation":{"type":"string"},"published_at":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDK":{"description":"advisory.OpenJDK","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"openjdk_cves":{"items":{"$ref":"#/components/schemas/advisory.OpenJDKCVE"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDKCVE":{"description":"advisory.OpenJDKCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.OpenSSH":{"description":"advisory.OpenSSH","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenSSLSecAdv":{"description":"advisory.OpenSSLSecAdv","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/advisory.OpenSSLVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OpenSSLVulnerability":{"description":"advisory.OpenSSLVulnerability","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"$ref":"#/components/schemas/advisory.FixAff"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OpenStack":{"description":"advisory.OpenStack","properties":{"affects":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Opengear":{"description":"advisory.Opengear","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPU":{"description":"advisory.OracleCPU","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"product":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPUCSAF":{"description":"advisory.OracleCPUCSAF","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OriginalGHSA":{"description":"advisory.OriginalGHSA","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.GHSAAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"database_specific":{"$ref":"#/components/schemas/advisory.GHSADatabaseSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GHSAReference"},"type":"array","uniqueItems":false},"schema_version":{"type":"string"},"severity":{"items":{"$ref":"#/components/schemas/advisory.GHSASeverity"},"type":"array","uniqueItems":false},"summary":{"type":"string"}},"type":"object"},"advisory.OvalCVE":{"description":"advisory.OvalCVE","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OvalReference":{"description":"advisory.OvalReference","properties":{"ref_id":{"type":"string"},"ref_url":{"type":"string"},"source":{"type":"string"}},"type":"object"},"advisory.Override":{"description":"advisory.Override","properties":{"_annotation":{"$ref":"#/components/schemas/advisory.OverrideAnnotation"},"cve":{"$ref":"#/components/schemas/advisory.OverrideCVE"}},"type":"object"},"advisory.OverrideAnnotation":{"description":"advisory.OverrideAnnotation","properties":{"cve_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"reason":{"type":"string"},"snapshot":{"type":"string"},"triage_notes":{"$ref":"#/components/schemas/advisory.TriageNotes"}},"type":"object"},"advisory.OverrideCVE":{"description":"advisory.OverrideCVE","properties":{"configurations":{"items":{"$ref":"#/components/schemas/advisory.OverrideConfiguration"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OverrideConfiguration":{"description":"advisory.OverrideConfiguration","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.CPENode"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OwnCloud":{"description":"advisory.OwnCloud","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PGFix":{"description":"advisory.PGFix","properties":{"affected":{"type":"string"},"fixed":{"type":"string"}},"type":"object"},"advisory.PHPMyAdmin":{"description":"advisory.PHPMyAdmin","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PKCert":{"description":"advisory.PKCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTC":{"description":"advisory.PTC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTMDescriptions":{"description":"advisory.PTMDescriptions","properties":{"cweId":{"type":"string"},"description":{"type":"string"},"lang":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Package":{"description":"advisory.Package","properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.PackageStat":{"description":"advisory.PackageStat","properties":{"cpe":{"type":"string"},"fix_state":{"type":"string"},"package_name":{"type":"string"},"product_name":{"type":"string"}},"type":"object"},"advisory.PacketstormExploit":{"description":"advisory.PacketstormExploit","properties":{"author":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"download_url":{"type":"string"},"md5":{"type":"string"},"summary":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Palantir":{"description":"advisory.Palantir","properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaloAltoAdvisory":{"description":"advisory.PaloAltoAdvisory","properties":{"affected":{"type":"string"},"applicableVersions":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"confidentialityImpact":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvssbaseScore":{"type":"string"},"datePublished":{"type":"string"},"dateUpdated":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"problem":{"type":"string"},"product":{"type":"string"},"scope":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"unaffected":{"type":"string"},"url":{"type":"string"},"userInteraction":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.Panasonic":{"description":"advisory.Panasonic","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaperCut":{"description":"advisory.PaperCut","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Patch":{"description":"advisory.Patch","properties":{"advisory_id":{"type":"string"},"component":{"type":"string"},"link":{"type":"string"},"os_sw":{"type":"string"}},"type":"object"},"advisory.Pega":{"description":"advisory.Pega","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhilipsAdvisory":{"description":"advisory.PhilipsAdvisory","properties":{"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhoenixContactAdvisory":{"description":"advisory.PhoenixContactAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.PostgresSQL":{"description":"advisory.PostgresSQL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"pg_fix":{"items":{"$ref":"#/components/schemas/advisory.PGFix"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PowerDNS":{"description":"advisory.PowerDNS","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PrimeVersion":{"description":"advisory.PrimeVersion","properties":{"jdK":{"type":"string"},"prime":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Product":{"description":"advisory.Product","properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/components/schemas/advisory.IdentificationHelper"}},"type":"object"},"advisory.ProductBranch":{"description":"ProductTree contains information about the product tree (branches only).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.ProductBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/components/schemas/advisory.Product"},"relationships":{"items":{"$ref":"#/components/schemas/advisory.CSAFRelationship"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ProductSpecificDetail":{"description":"advisory.ProductSpecificDetail","properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.ProductsAffected":{"description":"advisory.ProductsAffected","properties":{"cve":{"type":"string"},"description":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.Progress":{"description":"advisory.Progress","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Proofpoint":{"description":"advisory.Proofpoint","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Publisher":{"description":"advisory.Publisher","properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.PureStorage":{"description":"advisory.PureStorage","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PyPAAdvisory":{"description":"advisory.PyPAAdvisory","properties":{"advisory_id":{"description":"ID is the PYSEC- identifier","type":"string"},"affected":{"description":"Affected will list out the vulnerable versions.","items":{"$ref":"#/components/schemas/advisory.PyPAAffected"},"type":"array","uniqueItems":false},"aliases":{"description":"Aliases are other identifiers that refer to this, such as a CVE","items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"description":"Details discuss the vulnerability information","type":"string"},"modified":{"description":"Modified is non-zero Time if entry was updated","type":"string"},"published":{"description":"Published is the datetime when this was released","type":"string"},"references":{"description":"References are links to more detailed advisories, fixes, etc.","items":{"$ref":"#/components/schemas/advisory.PyPAReference"},"type":"array","uniqueItems":false},"was_withdrawn":{"description":"WasWD indicates if the advisory was withdrawn or not.","type":"boolean"},"withdrawn":{"description":"Withdrawn is non-zero if this advisory has been withdrawn","type":"string"}},"type":"object"},"advisory.PyPAAffected":{"description":"advisory.PyPAAffected","properties":{"package":{"$ref":"#/components/schemas/advisory.PyPAPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.PyPARange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.PyPAEvent":{"description":"advisory.PyPAEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.PyPAPackage":{"description":"advisory.PyPAPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.PyPARange":{"description":"advisory.PyPARange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.PyPAEvent"},"type":"array","uniqueItems":false},"ranges_type":{"type":"string"}},"type":"object"},"advisory.PyPAReference":{"description":"advisory.PyPAReference","properties":{"refs_type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QNAPAdvisory":{"description":"advisory.QNAPAdvisory","properties":{"affected":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"last_update_date":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"severity_number":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.QQID":{"description":"advisory.QQID","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss3_score":{"type":"string"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"qid":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QSB":{"description":"advisory.QSB","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualcomm":{"description":"advisory.Qualcomm","properties":{"chipsets":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualys":{"description":"advisory.Qualys","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploits":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QualysQID":{"description":"advisory.QualysQID","properties":{"consequence":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v2":{"items":{"$ref":"#/components/schemas/advisory.CvsssV2_3"},"type":"array","uniqueItems":false},"cvss_v3":{"items":{"$ref":"#/components/schemas/advisory.CvsssV2_3"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_insert":{"type":"string"},"description":{"type":"string"},"patches":{"items":{"$ref":"#/components/schemas/advisory.Patch"},"type":"array","uniqueItems":false},"published":{"type":"string"},"qid":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor_refs":{"items":{"$ref":"#/components/schemas/advisory.VendorRef"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RDescription":{"description":"advisory.RDescription","properties":{"value":{"type":"string"}},"type":"object"},"advisory.RNote":{"description":"advisory.RNote","properties":{"audience":{"type":"string"},"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"description":"diff between xml \u0026\u0026 json","type":"integer"}},"type":"object"},"advisory.RRevision":{"description":"advisory.RRevision","properties":{"date":{"type":"string"},"description":{"$ref":"#/components/schemas/advisory.RDescription"},"number":{"type":"string"}},"type":"object"},"advisory.RScoreSet":{"description":"advisory.RScoreSet","properties":{"base_score":{"type":"string"},"product_id":{"type":"string"},"temporal_score":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.RThreat":{"description":"advisory.RThreat","properties":{"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/components/schemas/advisory.IVal"},"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"Type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.Range":{"description":"advisory.Range","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.Event"},"type":"array","uniqueItems":false},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RansomwareExploit":{"description":"advisory.RansomwareExploit","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"ransomware_family":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RecordType":{"description":"advisory.RecordType","properties":{"finding":{"type":"string"},"id":{"type":"string"},"kind":{"type":"string"}},"type":"object"},"advisory.RedLion":{"description":"advisory.RedLion","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RedhatCVE":{"description":"advisory.RedhatCVE","properties":{"advisories":{"items":{"type":"string"},"type":"array","uniqueItems":false},"advisory_csaf_vex_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_packages":{"description":"used for un-marshlling from redhat","items":{"type":"string"},"type":"array","uniqueItems":false},"affected_release":{"items":{"$ref":"#/components/schemas/advisory.AffectedRel"},"type":"array","uniqueItems":false},"bugzilla":{"type":"string"},"bugzilla_description":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_csaf_vex_url":{"type":"string"},"cvss3_score":{"type":"string"},"cvss3_scoring_vector":{"type":"string"},"cvss_score":{"type":"number"},"cvss_scoring_vector":{"type":"string"},"cwe":{"type":"string"},"package_state":{"items":{"$ref":"#/components/schemas/advisory.PackageStat"},"type":"array","uniqueItems":false},"packages":{"description":"used to index into vulncheck OS","items":{"$ref":"#/components/schemas/advisory.VulnCheckPackage"},"type":"array","uniqueItems":false},"public_date":{"type":"string"},"resource_url":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Reference":{"description":"advisory.Reference","properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RelatedRule":{"description":"advisory.RelatedRule","properties":{"id":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RemediationData":{"description":"advisory.RemediationData","properties":{"category":{"type":"string"},"date":{"type":"string"},"details":{"type":"string"},"entitlements":{"items":{"type":"string"},"type":"array","uniqueItems":false},"group_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"restart_required":{"$ref":"#/components/schemas/advisory.RestartData"}},"type":"object"},"advisory.Renesas":{"description":"advisory.Renesas","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ReportedExploit":{"description":"advisory.ReportedExploit","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RestartData":{"description":"advisory.RestartData","properties":{"category":{"type":"string"},"details":{"type":"string"}},"type":"object"},"advisory.RevisionHistory":{"description":"advisory.RevisionHistory","properties":{"date":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Revive":{"description":"advisory.Revive","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RhelCVE":{"description":"advisory.RhelCVE","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Roche":{"description":"advisory.Roche","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"roche_cves":{"items":{"$ref":"#/components/schemas/advisory.RocheCVE"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RocheCVE":{"description":"advisory.RocheCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.Rockwell":{"description":"advisory.Rockwell","properties":{"affected_products":{"items":{"$ref":"#/components/schemas/advisory.RockwellAffectedProduct"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RockwellAffectedProduct":{"description":"advisory.RockwellAffectedProduct","properties":{"affectedCatalogNumber":{"type":"string"},"affectedVersion":{"type":"string"},"correctedVersion":{"type":"string"},"cve":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.RockyAdvisory":{"description":"advisory.RockyAdvisory","properties":{"affectedProducts":{"items":{"type":"string"},"type":"array","uniqueItems":false},"buildReferences":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cves":{"items":{"$ref":"#/components/schemas/advisory.RockyCve"},"type":"array","uniqueItems":false},"description":{"type":"string"},"fixes":{"items":{"$ref":"#/components/schemas/advisory.RockyFix"},"type":"array","uniqueItems":false},"name":{"type":"string"},"publishedAt":{"type":"string"},"rebootSuggested":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"rpms":{"$ref":"#/components/schemas/advisory.RockyRpms"},"severity":{"type":"string"},"shortCode":{"type":"string"},"solution":{"type":"string"},"synopsis":{"type":"string"},"topic":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RockyCve":{"description":"advisory.RockyCve","properties":{"cvss3BaseScore":{"type":"string"},"cvss3ScoringVector":{"type":"string"},"cwe":{"type":"string"},"name":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"}},"type":"object"},"advisory.RockyErrata":{"description":"advisory.RockyErrata","properties":{"advisory":{"$ref":"#/components/schemas/advisory.RockyAdvisory"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.RockyPackage"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.RockyFix":{"description":"advisory.RockyFix","properties":{"description":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"},"ticket":{"type":"string"}},"type":"object"},"advisory.RockyPackage":{"description":"advisory.RockyPackage","properties":{"distro":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.RockyRpms":{"additionalProperties":{"$ref":"#/components/schemas/advisory.RockyVersion"},"description":"advisory.RockyRpms","type":"object"},"advisory.RockyVersion":{"description":"advisory.RockyVersion","properties":{"nvras":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Rsync":{"description":"advisory.Rsync","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ruckus":{"description":"advisory.Ruckus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RustsecAdvisory":{"description":"advisory.RustsecAdvisory","properties":{"advisory":{"$ref":"#/components/schemas/advisory.RustsecFrontMatterAdvisory"},"affected":{"$ref":"#/components/schemas/advisory.RustsecAffected"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"versions":{"$ref":"#/components/schemas/advisory.RustsecFrontMatterVersions"}},"type":"object"},"advisory.RustsecAffected":{"description":"advisory.RustsecAffected","properties":{"arch":{"items":{"type":"string"},"type":"array","uniqueItems":false},"functions":{"type":"string"},"os":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RustsecFrontMatterAdvisory":{"description":"advisory.RustsecFrontMatterAdvisory","properties":{"aliases":{"description":"Vulnerability aliases, e.g. CVE IDs (optional but recommended)\nRequest a CVE for your RustSec vulns: https://iwantacve.org/","items":{"type":"string"},"type":"array","uniqueItems":false},"categories":{"description":"Optional: Categories this advisory falls under. Valid categories are:\n\"code-execution\", \"crypto-failure\", \"denial-of-service\", \"file-disclosure\"\n\"format-injection\", \"memory-corruption\", \"memory-exposure\", \"privilege-escalation\"","items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"description":"Optional: a Common Vulnerability Scoring System score. More information\ncan be found on the CVSS website, https://www.first.org/cvss/.","type":"string"},"date":{"description":"Disclosure date of the advisory as an RFC 3339 date (mandatory)","type":"string"},"informational":{"description":"Optional: Indicates the type of informational security advisory\n - \"unsound\" for soundness issues\n - \"unmaintained\" for crates that are no longer maintained\n - \"notice\" for other informational notices","type":"string"},"keywords":{"description":"Freeform keywords which describe this vulnerability, similar to Cargo (optional)","items":{"type":"string"},"type":"array","uniqueItems":false},"package":{"description":"Name of the affected crate (mandatory)","type":"string"},"references":{"description":"URL to additional helpful references regarding the advisory (optional)","items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"description":"Related vulnerabilities (optional)\ne.g. CVE for a C library wrapped by a -sys crate)","items":{"type":"string"},"type":"array","uniqueItems":false},"rustsec_id":{"description":"Identifier for the advisory (mandatory). Will be assigned a \"RUSTSEC-YYYY-NNNN\"\nidentifier e.g. RUSTSEC-2018-0001. Please use \"RUSTSEC-0000-0000\" in PRs.","type":"string"},"url":{"description":"URL to a long-form description of this issue, e.g. a GitHub issue/PR,\na change log entry, or a blogpost announcing the release (optional)","type":"string"},"withdrawn":{"description":"Whether the advisory is withdrawn (optional)","type":"string"}},"type":"object"},"advisory.RustsecFrontMatterVersions":{"description":"advisory.RustsecFrontMatterVersions","properties":{"patched":{"items":{"type":"string"},"type":"array","uniqueItems":false},"unaffected":{"description":"Versions which were never vulnerable (optional)","items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SAAdvisory":{"description":"advisory.SAAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"threats":{"type":"string"},"vendor":{"type":"string"},"warningDate":{"type":"string"},"warningNumber":{"type":"string"}},"type":"object"},"advisory.SAP":{"description":"advisory.SAP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SECConsult":{"description":"advisory.SECConsult","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SSASource":{"description":"advisory.SSASource","properties":{"document":{"$ref":"#/components/schemas/advisory.SiemensDocument"},"product_tree":{"$ref":"#/components/schemas/advisory.SiemensProductTree"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/advisory.SiemensVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SSDAdvisory":{"description":"advisory.SSDAdvisory","properties":{"analysis":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"poc":{"description":"contains actual poc code","type":"string"},"published":{"type":"string"},"response_ref":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.Safran":{"description":"advisory.Safran","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SaintExploit":{"description":"advisory.SaintExploit","properties":{"bid":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"osvdb":{"type":"string"},"saint_id":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SalesForce":{"description":"advisory.SalesForce","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Samba":{"description":"advisory.Samba","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issues":{"type":"string"},"patches":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sandisk":{"description":"advisory.Sandisk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SansDshield":{"description":"advisory.SansDshield","properties":{"count":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"firstSeen":{"type":"string"},"lastSeen":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SchneiderCVE":{"description":"advisory.SchneiderCVE","properties":{"cve":{"type":"string"},"cvss_score3":{"type":"string"},"cvss_score4":{"type":"string"},"cvss_vector3":{"type":"string"},"cvss_vector4":{"type":"string"}},"type":"object"},"advisory.SchneiderElectricAdvisory":{"description":"advisory.SchneiderElectricAdvisory","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"pdf_url":{"type":"string"},"schneider_cves":{"items":{"$ref":"#/components/schemas/advisory.SchneiderCVE"},"type":"array","uniqueItems":false},"schneider_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Schutzwerk":{"description":"advisory.Schutzwerk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SecFix":{"description":"advisory.SecFix","properties":{"arch":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SecurityBulletin":{"description":"advisory.SecurityBulletin","properties":{"acknowledgement":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvedetails":{"items":{"$ref":"#/components/schemas/advisory.CVEDetail"},"type":"array"},"date_added":{"type":"string"},"hardwareUpdates":{"items":{"$ref":"#/components/schemas/advisory.HardwareUpdate"},"type":"array"},"lastUpdated":{"type":"string"},"link":{"type":"string"},"revisions":{"items":{"$ref":"#/components/schemas/advisory.NvidiaRevision"},"type":"array"},"severity":{"type":"string"},"softwareUpdates":{"items":{"$ref":"#/components/schemas/advisory.SoftwareUpdate"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SecurityLab":{"description":"advisory.SecurityLab","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.SeebugExploit":{"description":"advisory.SeebugExploit","properties":{"author":{"type":"string"},"category":{"type":"string"},"cnnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"component":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"find_time":{"type":"string"},"name":{"type":"string"},"ssv_id":{"type":"string"},"submitter":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sel":{"description":"advisory.Sel","properties":{"acknowledgement":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SentinelOne":{"description":"advisory.SentinelOne","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ServiceNow":{"description":"advisory.ServiceNow","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SevenZip":{"description":"advisory.SevenZip","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Severity":{"description":"advisory.Severity","properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ShadowServerExploitedVulnerability":{"description":"advisory.ShadowServerExploitedVulnerability","properties":{"cnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"detections_last_1_day":{"type":"integer"},"detections_last_30_days":{"type":"integer"},"detections_last_7_days":{"type":"integer"},"detections_last_90_days":{"type":"integer"},"edb":{"type":"string"},"in_kev":{"type":"boolean"},"is_iot":{"type":"boolean"},"is_ransomware":{"type":"boolean"},"product":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_id":{"type":"string"},"vulnerability_link":{"type":"string"}},"type":"object"},"advisory.Shielder":{"description":"advisory.Shielder","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sick":{"description":"advisory.Sick","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SiemensAcknowledgments":{"description":"advisory.SiemensAcknowledgments","properties":{"names":{"items":{"type":"string"},"type":"array","uniqueItems":false},"organization":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensAdvisory":{"description":"advisory.SiemensAdvisory","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf_url":{"type":"string"},"date_added":{"type":"string"},"html_url":{"type":"string"},"id":{"type":"string"},"last_update":{"description":"could potentially kill this in the future as it's a dupe","type":"string"},"pdf_url":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ssa":{"$ref":"#/components/schemas/advisory.SSASource"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"txt_url":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SiemensBranch":{"description":"advisory.SiemensBranch","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensSubBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensCVSSV3":{"description":"advisory.SiemensCVSSV3","properties":{"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensCWE":{"description":"advisory.SiemensCWE","properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensDistribution":{"description":"advisory.SiemensDistribution","properties":{"text":{"type":"string"},"tlp":{"$ref":"#/components/schemas/advisory.SiemensTLP"}},"type":"object"},"advisory.SiemensDocument":{"description":"advisory.SiemensDocument","properties":{"acknowledgments":{"items":{"$ref":"#/components/schemas/advisory.SiemensAcknowledgments"},"type":"array","uniqueItems":false},"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/components/schemas/advisory.SiemensDistribution"},"notes":{"items":{"$ref":"#/components/schemas/advisory.SiemensNotes"},"type":"array","uniqueItems":false},"publisher":{"$ref":"#/components/schemas/advisory.SiemensPublisher"},"references":{"items":{"$ref":"#/components/schemas/advisory.SiemensReferences"},"type":"array","uniqueItems":false},"title":{"type":"string"},"tracking":{"$ref":"#/components/schemas/advisory.SiemensTracking"}},"type":"object"},"advisory.SiemensEngine":{"description":"advisory.SiemensEngine","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensGenerator":{"description":"advisory.SiemensGenerator","properties":{"engine":{"$ref":"#/components/schemas/advisory.SiemensEngine"}},"type":"object"},"advisory.SiemensNotes":{"description":"advisory.SiemensNotes","properties":{"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensProduct":{"description":"advisory.SiemensProduct","properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/components/schemas/advisory.SiemensProductIdentificationHelper"}},"type":"object"},"advisory.SiemensProductIdentificationHelper":{"description":"advisory.SiemensProductIdentificationHelper","properties":{"model_numbers":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensProductStatus":{"description":"advisory.SiemensProductStatus","properties":{"known_affected":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensProductTree":{"description":"advisory.SiemensProductTree","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensBranch"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensPublisher":{"description":"advisory.SiemensPublisher","properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.SiemensReferences":{"description":"advisory.SiemensReferences","properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRemediation":{"description":"advisory.SiemensRemediation","properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRevisionHistory":{"description":"advisory.SiemensRevisionHistory","properties":{"date":{"type":"string"},"legacy_version":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensScore":{"description":"advisory.SiemensScore","properties":{"cvss_v3":{"$ref":"#/components/schemas/advisory.SiemensCVSSV3"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensSubBranch":{"description":"advisory.SiemensSubBranch","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensSubSubBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensSubSubBranch":{"description":"advisory.SiemensSubSubBranch","properties":{"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/components/schemas/advisory.SiemensProduct"}},"type":"object"},"advisory.SiemensTLP":{"description":"advisory.SiemensTLP","properties":{"label":{"type":"string"}},"type":"object"},"advisory.SiemensTracking":{"description":"advisory.SiemensTracking","properties":{"current_release_date":{"type":"string"},"generator":{"$ref":"#/components/schemas/advisory.SiemensGenerator"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/components/schemas/advisory.SiemensRevisionHistory"},"type":"array","uniqueItems":false},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensVulnerability":{"description":"advisory.SiemensVulnerability","properties":{"cve":{"type":"string"},"cwe":{"$ref":"#/components/schemas/advisory.SiemensCWE"},"notes":{"items":{"$ref":"#/components/schemas/advisory.SiemensNotes"},"type":"array","uniqueItems":false},"product_status":{"$ref":"#/components/schemas/advisory.SiemensProductStatus"},"references":{"items":{"$ref":"#/components/schemas/advisory.SiemensReferences"},"type":"array","uniqueItems":false},"remediations":{"items":{"$ref":"#/components/schemas/advisory.SiemensRemediation"},"type":"array","uniqueItems":false},"scores":{"items":{"$ref":"#/components/schemas/advisory.SiemensScore"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SierraWireless":{"description":"advisory.SierraWireless","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"swid":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRule":{"description":"advisory.SigmaRule","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_attack_techniques":{"items":{"type":"string"},"type":"array","uniqueItems":false},"sigma_rule":{"$ref":"#/components/schemas/advisory.SigmaRuleRule"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRuleRule":{"description":"advisory.SigmaRuleRule","properties":{"author":{"type":"string"},"date":{"type":"string"},"description":{"type":"string"},"detection":{"additionalProperties":{},"type":"object"},"false_positives":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fields":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"level":{"type":"string"},"logsource":{"$ref":"#/components/schemas/advisory.LogSource"},"modified":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"items":{"$ref":"#/components/schemas/advisory.RelatedRule"},"type":"array","uniqueItems":false},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SingCert":{"description":"advisory.SingCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"}},"type":"object"},"advisory.Sitecore":{"description":"advisory.Sitecore","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"summary_ja":{"type":"string"},"title":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Slackware":{"description":"advisory.Slackware","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SoftwareUpdate":{"description":"advisory.SoftwareUpdate","properties":{"affectedVersion":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"operatingSystem":{"type":"string"},"softwareProduct":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.SolarWindsAdvisory":{"description":"advisory.SolarWindsAdvisory","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Solr":{"description":"advisory.Solr","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sonatype":{"description":"advisory.Sonatype","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SonicWallAdvisory":{"description":"advisory.SonicWallAdvisory","properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"impact":{"type":"string"},"is_workaround_available":{"type":"boolean"},"last_updated_when":{"type":"string"},"published_when":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vuln_status":{"type":"string"},"vulnerable_products_list":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SpacelabsHealthcareAdvisory":{"description":"advisory.SpacelabsHealthcareAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Splunk":{"description":"advisory.Splunk","properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"$ref":"#/components/schemas/advisory.SplunkProduct"},"type":"array","uniqueItems":false},"bug_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SplunkProduct":{"description":"advisory.SplunkProduct","properties":{"affected_version":{"type":"string"},"component":{"type":"string"},"fixed_version":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Spring":{"description":"advisory.Spring","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Stormshield":{"description":"advisory.Stormshield","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.StrykerAdvisory":{"description":"advisory.StrykerAdvisory","properties":{"affected_components":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sudo":{"description":"advisory.Sudo","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"fix":{"type":"string"},"impact":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.SuseSecurity":{"description":"advisory.SuseSecurity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SwisslogHealthcareAdvisory":{"description":"advisory.SwisslogHealthcareAdvisory","properties":{"affected_components":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Symfony":{"description":"advisory.Symfony","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synacktiv":{"description":"advisory.Synacktiv","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SyncroSoft":{"description":"advisory.SyncroSoft","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synology":{"description":"advisory.Synology","properties":{"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"last_updated":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Syss":{"description":"advisory.Syss","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TI":{"description":"advisory.TI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"incident_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TPLink":{"description":"advisory.TPLink","properties":{"bulletin_id":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TWCertAdvisory":{"description":"advisory.TWCertAdvisory","properties":{"affected_cn":{"type":"string"},"affected_en":{"type":"string"},"credit_cn":{"type":"string"},"credit_en":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_cn":{"type":"string"},"description_en":{"type":"string"},"link":{"type":"string"},"solution_cn":{"type":"string"},"solution_en":{"type":"string"},"title_cn":{"type":"string"},"title_en":{"type":"string"},"tvnid":{"type":"string"}},"type":"object"},"advisory.Tailscale":{"description":"advisory.Tailscale","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TalosAdvisory":{"description":"advisory.TalosAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"talos_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TeamViewer":{"description":"advisory.TeamViewer","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TenableResearchAdvisory":{"description":"advisory.TenableResearchAdvisory","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tencent":{"description":"advisory.Tencent","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Thales":{"description":"advisory.Thales","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TheMissingLink":{"description":"advisory.TheMissingLink","properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThermoFisher":{"description":"advisory.ThermoFisher","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThreatActorWithExternalObjects":{"description":"advisory.ThreatActorWithExternalObjects","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"country":{"type":"string"},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"misp_id":{"type":"string"},"misp_threat_actor":{"$ref":"#/components/schemas/advisory.MISPValueNoID"},"mitre_attack_group":{"$ref":"#/components/schemas/advisory.MITREAttackGroupNoID"},"mitre_group_cti":{"$ref":"#/components/schemas/advisory.MitreGroupCTI"},"mitre_id":{"type":"string"},"threat_actor_name":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false},"vendor_names_for_threat_actors":{"items":{"$ref":"#/components/schemas/advisory.VendorNameForThreatActor"},"type":"array","uniqueItems":false},"vendors_and_products_targeted":{"items":{"$ref":"#/components/schemas/advisory.VendorProduct"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ThreatData":{"description":"advisory.ThreatData","properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Tibco":{"description":"advisory.Tibco","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"overview":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Timeline":{"description":"advisory.Timeline","properties":{"lang":{"type":"string"},"time":{"description":"FIXME: flip to time","type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Tool":{"description":"advisory.Tool","properties":{"name":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.ToolRef"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ToolRef":{"description":"advisory.ToolRef","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tracking":{"description":"advisory.Tracking","properties":{"current_release_date":{"type":"string"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/components/schemas/advisory.RevisionHistory"},"type":"array","uniqueItems":false},"status":{"type":"string"},"version":{"description":"should match last 'number' in []RevisionHistory","type":"string"}},"type":"object"},"advisory.TrackingID":{"description":"advisory.TrackingID","properties":{"system_name":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.TraneTechnology":{"description":"advisory.TraneTechnology","properties":{"brand":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TrendMicro":{"description":"advisory.TrendMicro","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"scores":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TriageNotes":{"description":"advisory.TriageNotes","properties":{"references":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Trustwave":{"description":"advisory.Trustwave","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USD":{"description":"advisory.USD","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USOMAdvisory":{"description":"advisory.USOMAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"effect_tr":{"type":"string"},"general_information_tr":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_tr":{"type":"string"},"title_tr":{"type":"string"},"trid":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ubiquiti":{"description":"advisory.Ubiquiti","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"links":{"items":{"type":"string"},"type":"array","uniqueItems":false},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.UbuntuCVE":{"description":"advisory.UbuntuCVE","properties":{"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.AffectedUbuntuPackage"},"type":"array","uniqueItems":false},"cve":{"description":"Candidate","items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"PublicDate","type":"string"},"reference_urls":{"description":"References","items":{"type":"string"},"type":"array","uniqueItems":false},"source_url":{"type":"string"},"status":{"description":"active || retired","type":"string"},"ubuntu_url":{"type":"string"},"usn":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.UbuntuPackageReleaseStatus":{"description":"advisory.UbuntuPackageReleaseStatus","properties":{"affected":{"type":"boolean"},"fixed":{"type":"boolean"},"fixed_version":{"type":"string"},"lts":{"type":"boolean"},"release":{"type":"string"},"release_long":{"type":"string"},"release_version":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.Unify":{"description":"advisory.Unify","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Unisoc":{"description":"advisory.Unisoc","properties":{"access_vector":{"type":"string"},"affected_chipsets":{"type":"string"},"affected_software":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"rating":{"type":"string"},"score":{"type":"string"},"severity":{"type":"string"},"technology":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Update":{"description":"advisory.Update","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/components/schemas/advisory.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.Package"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.Reference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/components/schemas/advisory.DateTime"}},"type":"object"},"advisory.Updated":{"description":"advisory.Updated","type":"object"},"advisory.V3AcceptanceLevel":{"description":"advisory.V3AcceptanceLevel","properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.VCCPEDictionary":{"description":"advisory.VCCPEDictionary","properties":{"baseCPE":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.VCVulnerableCPEs":{"description":"advisory.VCVulnerableCPEs","properties":{"cve":{"type":"string"},"unrolled":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.VDEAdvisory":{"description":"advisory.VDEAdvisory","properties":{"csaf_json":{"$ref":"#/components/schemas/advisory.CSAF"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"type":"string"}},"type":"object"},"advisory.VLC":{"description":"advisory.VLC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VMWareAdvisory":{"description":"advisory.VMWareAdvisory","properties":{"AdvisoryID":{"type":"string"},"AdvisoryURL":{"type":"string"},"CVSSv3Range":{"type":"string"},"IssueDate":{"type":"string"},"Severity":{"type":"string"},"Synopsis":{"type":"string"},"UpdatedOn":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.VYAIREAdvisory":{"description":"advisory.VYAIREAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VanDyke":{"description":"advisory.VanDyke","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VapidLabsAdvisory":{"description":"advisory.VapidLabsAdvisory","properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"exploit":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"vapidId":{"type":"string"},"vendor":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Veeam":{"description":"advisory.Veeam","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VendorNameForThreatActor":{"description":"advisory.VendorNameForThreatActor","properties":{"threat_actor_name":{"type":"string"},"url":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.VendorProduct":{"description":"advisory.VendorProduct","properties":{"product":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.VendorRef":{"description":"advisory.VendorRef","properties":{"vendor_ref":{"type":"string"},"vendor_ref_url":{"type":"string"}},"type":"object"},"advisory.Veritas":{"description":"advisory.Veritas","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Virtuozzo":{"description":"advisory.Virtuozzo","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VoidSec":{"description":"advisory.VoidSec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheck":{"description":"advisory.VulnCheck","properties":{"affecting":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credit":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cvss_v3_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckCVEListV5":{"description":"advisory.VulnCheckCVEListV5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckConfig":{"description":"advisory.VulnCheckConfig","properties":{"config":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"}},"type":"object"},"advisory.VulnCheckKEV":{"description":"advisory.VulnCheckKEV","properties":{"_timestamp":{"type":"string"},"cisa_date_added":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"product":{"type":"string"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"required_action":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulncheck_reported_exploitation":{"items":{"$ref":"#/components/schemas/advisory.ReportedExploit"},"type":"array","uniqueItems":false},"vulncheck_xdb":{"items":{"$ref":"#/components/schemas/advisory.XDB"},"type":"array","uniqueItems":false},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.VulnCheckPackage":{"description":"advisory.VulnCheckPackage","properties":{"arch":{"type":"string"},"distro":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnerableDebianPackage":{"description":"advisory.VulnerableDebianPackage","properties":{"associated_cves":{"items":{"$ref":"#/components/schemas/advisory.DebianCVE"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package_name":{"type":"string"}},"type":"object"},"advisory.VulnerableProduct":{"description":"advisory.VulnerableProduct","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnrichment":{"description":"advisory.Vulnrichment","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.VulnrichmentCVERef"},"url":{"type":"string"}},"type":"object"},"advisory.VulnrichmentCVERef":{"description":"advisory.VulnrichmentCVERef","properties":{"containers":{"$ref":"#/components/schemas/advisory.VulnrichmentContainers"},"cveMetadata":{"$ref":"#/components/schemas/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.VulnrichmentContainers":{"description":"advisory.VulnrichmentContainers","properties":{"adp":{"items":{"$ref":"#/components/schemas/advisory.ADP"},"type":"array","uniqueItems":false},"cna":{"$ref":"#/components/schemas/advisory.MCna"}},"type":"object"},"advisory.VulnrichmentContent":{"description":"advisory.VulnrichmentContent","properties":{"id":{"type":"string"},"options":{"items":{"$ref":"#/components/schemas/advisory.VulnrichmentOption"},"type":"array","uniqueItems":false},"role":{"type":"string"},"timestamp":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnrichmentMetric":{"description":"advisory.VulnrichmentMetric","properties":{"other":{"$ref":"#/components/schemas/advisory.VulnrichmentOther"}},"type":"object"},"advisory.VulnrichmentOption":{"description":"advisory.VulnrichmentOption","properties":{"Automatable":{"type":"string"},"Exploitation":{"type":"string"},"Technical Impact":{"type":"string"}},"type":"object"},"advisory.VulnrichmentOther":{"description":"advisory.VulnrichmentOther","properties":{"content":{"$ref":"#/components/schemas/advisory.VulnrichmentContent"},"type":{"type":"string"}},"type":"object"},"advisory.WRT":{"description":"advisory.WRT","properties":{"advisory":{"type":"string"},"affectedVersions":{"type":"string"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"requirements":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WatchGuard":{"description":"advisory.WatchGuard","properties":{"advisory_id":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"resolution":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WhatsApp":{"description":"advisory.WhatsApp","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wibu":{"description":"advisory.Wibu","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wireshark":{"description":"advisory.Wireshark","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WithSecure":{"description":"advisory.WithSecure","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WolfSSL":{"description":"advisory.WolfSSL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Wolfi":{"description":"advisory.Wolfi","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.WolfiPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.WolfiPackage":{"description":"advisory.WolfiPackage","properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.WolfiSecFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.WolfiSecFix":{"description":"advisory.WolfiSecFix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"}},"type":"object"},"advisory.Wordfence":{"description":"advisory.Wordfence","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.XDB":{"description":"advisory.XDB","properties":{"clone_ssh_url":{"type":"string"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"xdb_id":{"type":"string"},"xdb_url":{"type":"string"}},"type":"object"},"advisory.Xen":{"description":"advisory.Xen","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updatedAt":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xerox":{"description":"advisory.Xerox","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xiaomi":{"description":"advisory.Xiaomi","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"internal_id":{"type":"string"},"summary":{"type":"string"},"summary_cn":{"type":"string"},"title":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xylem":{"description":"advisory.Xylem","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"xsa":{"type":"string"}},"type":"object"},"advisory.Yamaha":{"description":"advisory.Yamaha","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.YokogawaAdvisory":{"description":"advisory.YokogawaAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"ysar_id":{"type":"string"}},"type":"object"},"advisory.Yubico":{"description":"advisory.Yubico","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZDI":{"description":"advisory.ZDI","properties":{"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"string"},"discoverers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"filter_ids_dv":{"items":{"type":"string"},"type":"array","uniqueItems":false},"last_updated_at":{"type":"string"},"products":{"items":{"$ref":"#/components/schemas/advisory.ZDIProduct"},"type":"array","uniqueItems":false},"public_advisory":{"type":"string"},"published_date":{"type":"string"},"responses":{"items":{"$ref":"#/components/schemas/advisory.ZDIResponse"},"type":"array","uniqueItems":false},"title":{"type":"string"},"zdi_can":{"type":"string"},"zdi_public":{"type":"string"}},"type":"object"},"advisory.ZDIProduct":{"description":"advisory.ZDIProduct","properties":{"name":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/components/schemas/advisory.ZDIVendor"}},"type":"object"},"advisory.ZDIResponse":{"description":"advisory.ZDIResponse","properties":{"text":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/components/schemas/advisory.ZDIResponseVendor"}},"type":"object"},"advisory.ZDIResponseVendor":{"description":"advisory.ZDIResponseVendor","properties":{"name":{"type":"string"}},"type":"object"},"advisory.ZDIVendor":{"description":"advisory.ZDIVendor","properties":{"name":{"type":"string"},"uri":{"type":"string"}},"type":"object"},"advisory.Zebra":{"description":"advisory.Zebra","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZeroDayAdvisory":{"description":"advisory.ZeroDayAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zdi":{"$ref":"#/components/schemas/advisory.ZDI"}},"type":"object"},"advisory.ZeroScienceAdvisory":{"description":"advisory.ZeroScienceAdvisory","properties":{"advisoryId":{"type":"string"},"affectedVersions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"poC":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Zimbra":{"description":"advisory.Zimbra","properties":{"bugs":{"items":{"type":"integer"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"fix":{"type":"string"},"rating":{"type":"string"},"reporter":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Zoom":{"description":"advisory.Zoom","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"zsb":{"type":"string"}},"type":"object"},"advisory.Zscaler":{"description":"advisory.Zscaler","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZuluVersion":{"description":"advisory.ZuluVersion","properties":{"jdk":{"type":"string"},"type":{"type":"string"},"zulu":{"type":"string"}},"type":"object"},"advisory.Zuso":{"description":"advisory.Zuso","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zaid":{"type":"string"}},"type":"object"},"advisory.Zyxel":{"description":"advisory.Zyxel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.BaseMetricV2":{"description":"api.BaseMetricV2","properties":{"acInsufInfo":{"type":"boolean"},"cvssV2":{"$ref":"#/components/schemas/api.CVSSV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"severity":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.BaseMetricV3":{"description":"api.BaseMetricV3","properties":{"cvssV3":{"$ref":"#/components/schemas/api.CVSSV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"}},"type":"object"},"api.CPE":{"description":"api.CPE","properties":{"edition":{"type":"string"},"language":{"type":"string"},"other":{"type":"string"},"part":{"type":"string"},"product":{"type":"string"},"sw_edition":{"type":"string"},"target_hw":{"type":"string"},"target_sw":{"type":"string"},"update":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CPEMatch":{"description":"api.CPEMatch","properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"cpe_name":{"items":{"$ref":"#/components/schemas/api.CPEName"},"type":"array","uniqueItems":false},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"api.CPEName":{"description":"api.CPEName","properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"lastModifiedDate":{"type":"string"}},"type":"object"},"api.CVE":{"description":"api.CVE","properties":{"CVE_data_meta":{"$ref":"#/components/schemas/api.CVEDataMeta"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/components/schemas/api.Description"},"problemtype":{"$ref":"#/components/schemas/api.ProblemType"},"references":{"$ref":"#/components/schemas/api.References"}},"type":"object"},"api.CVEDataMeta":{"description":"api.CVEDataMeta","properties":{"ASSIGNER":{"type":"string"},"ID":{"type":"string"}},"type":"object"},"api.CVEDataMetaExtended":{"description":"api.CVEDataMetaExtended","properties":{"ALIAS":{"type":"string"},"ASSIGNER":{"type":"string"},"ID":{"type":"string"},"STATUS":{"type":"string"}},"type":"object"},"api.CVEExtended":{"description":"api.CVEExtended","properties":{"CVE_data_meta":{"$ref":"#/components/schemas/api.CVEDataMetaExtended"},"categorization":{"$ref":"#/components/schemas/api.CategorizationExtended"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/components/schemas/api.Description"},"problemtype":{"$ref":"#/components/schemas/api.ProblemTypeExtended"},"references":{"$ref":"#/components/schemas/api.ReferencesExtended"}},"type":"object"},"api.CVSSV2":{"description":"api.CVSSV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CVSSV3":{"description":"api.CVSSV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CWE":{"description":"api.CWE","properties":{"abstraction":{"type":"string"},"description":{"type":"string"},"kev_count":{"type":"integer"},"status":{"type":"string"},"structure":{"type":"string"},"vulncheck_nvd_count":{"type":"integer"},"weakness_id":{"type":"string"},"weakness_name":{"type":"string"},"weighted_score":{"type":"number"}},"type":"object"},"api.CategorizationExtended":{"description":"api.CategorizationExtended","properties":{"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.ClientFingerprints":{"description":"api.ClientFingerprints","properties":{"hassh":{"type":"string"},"ja3":{"type":"string"},"ja4":{"type":"string"}},"type":"object"},"api.Configurations":{"description":"api.Configurations","properties":{"CVE_data_version":{"type":"string"},"nodes":{"items":{"$ref":"#/components/schemas/api.Nodes"},"type":"array","uniqueItems":false}},"type":"object"},"api.CveItems":{"description":"api.CveItems","properties":{"configurations":{"$ref":"#/components/schemas/api.Configurations"},"cve":{"$ref":"#/components/schemas/api.CVE"},"impact":{"$ref":"#/components/schemas/api.Impact"},"lastModifiedDate":{"type":"string"},"publishedDate":{"type":"string"},"vcConfigurations":{"$ref":"#/components/schemas/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.CveItemsExtended":{"description":"api.CveItemsExtended","properties":{"_timestamp":{"type":"string"},"configurations":{"$ref":"#/components/schemas/api.Configurations"},"cve":{"$ref":"#/components/schemas/api.CVEExtended"},"date_added":{"type":"string"},"documentGenerationDate":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"impact":{"$ref":"#/components/schemas/api.ImpactExtended"},"lastModifiedDate":{"type":"string"},"mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/api.MitreAttackTech"},"type":"array","uniqueItems":false},"publishedDate":{"type":"string"},"related_attack_patterns":{"items":{"$ref":"#/components/schemas/api.RelatedAttackPattern"},"type":"array","uniqueItems":false},"vcConfigurations":{"$ref":"#/components/schemas/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vulnerable_cpes":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.DateTime":{"description":"api.DateTime","type":"object"},"api.Description":{"description":"api.Description","properties":{"description_data":{"items":{"$ref":"#/components/schemas/api.DescriptionData"},"type":"array","uniqueItems":false}},"type":"object"},"api.DescriptionData":{"description":"api.DescriptionData","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.EPSS":{"description":"exclude EPSS from changelog","properties":{"epss_percentile":{"type":"number"},"epss_score":{"type":"number"},"last_modified":{"type":"string"}},"type":"object"},"api.EPSSData":{"description":"api.EPSSData","properties":{"_timestamp":{"type":"string"},"cve":{"type":"string"},"epss_percentile":{"type":"number"},"epss_score":{"type":"number"}},"type":"object"},"api.ExploitChain":{"description":"api.ExploitChain","properties":{"cves":{"items":{"$ref":"#/components/schemas/api.ExploitChainCVE"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.ExploitChainCVE":{"description":"api.ExploitChainCVE","properties":{"cve":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ExploitV3Result":{"description":"api.ExploitV3Result","properties":{"_timestamp":{"description":"ignore this field when checking for differences/changes","type":"string"},"commercial_exploit_found":{"type":"boolean"},"counts":{"$ref":"#/components/schemas/api.ExploitsV3Count"},"date_added":{"type":"string"},"epss":{"$ref":"#/components/schemas/api.EPSS"},"exploits":{"items":{"$ref":"#/components/schemas/api.NormalizedExploitV3Entry"},"type":"array","uniqueItems":false},"id":{"type":"string"},"inKEV":{"type":"boolean"},"inVCKEV":{"type":"boolean"},"max_exploit_maturity":{"type":"string"},"public_exploit_found":{"type":"boolean"},"reported_exploitation":{"items":{"$ref":"#/components/schemas/api.NormalizedReportV3Entry"},"type":"array","uniqueItems":false},"reported_exploited":{"type":"boolean"},"reported_exploited_by_botnets":{"type":"boolean"},"reported_exploited_by_honeypot_service":{"type":"boolean"},"reported_exploited_by_ransomware":{"type":"boolean"},"reported_exploited_by_threat_actors":{"type":"boolean"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"timeline":{"$ref":"#/components/schemas/api.ExploitsV3Timeline"},"trending":{"$ref":"#/components/schemas/api.ExploitsTrending"},"weaponized_exploit_found":{"type":"boolean"}},"type":"object"},"api.ExploitsChange":{"description":"api.ExploitsChange","properties":{"change_time":{"type":"string"},"change_type":{"type":"string"},"field":{"type":"string"},"new_value":{},"old_value":{}},"type":"object"},"api.ExploitsChangelog":{"description":"api.ExploitsChangelog","properties":{"changes":{"items":{"$ref":"#/components/schemas/api.ExploitsChange"},"type":"array","uniqueItems":false},"cve":{"type":"string"}},"type":"object"},"api.ExploitsTrending":{"description":"api.ExploitsTrending","properties":{"github":{"type":"boolean"}},"type":"object"},"api.ExploitsV3Count":{"description":"api.ExploitsV3Count","properties":{"botnets":{"type":"integer"},"exploits":{"type":"integer"},"ransomware_families":{"type":"integer"},"threat_actors":{"type":"integer"}},"type":"object"},"api.ExploitsV3Timeline":{"description":"api.ExploitsV3Timeline","properties":{"cisa_kev_date_added":{"type":"string"},"cisa_kev_date_due":{"type":"string"},"first_exploit_published":{"type":"string"},"first_exploit_published_weaponized_or_higher":{"type":"string"},"first_reported_botnet":{"type":"string"},"first_reported_ransomware":{"type":"string"},"first_reported_threat_actor":{"type":"string"},"most_recent_exploit_published":{"type":"string"},"most_recent_reported_botnet":{"type":"string"},"most_recent_reported_ransomware":{"type":"string"},"most_recent_reported_threat_actor":{"type":"string"},"nvd_last_modified":{"description":"it's often the case the nvd record was updated, but in a way that is irrelevant to the contents\nof a vc exploits record.","type":"string"},"nvd_published":{"type":"string"},"vulncheck_kev_date_added":{"type":"string"},"vulncheck_kev_date_due":{"type":"string"}},"type":"object"},"api.HTTPDetails":{"description":"api.HTTPDetails","properties":{"http_request_body":{"type":"string"},"http_user_agent":{"type":"string"},"method":{"type":"string"},"protocol":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.Impact":{"description":"api.Impact","properties":{"baseMetricV2":{"$ref":"#/components/schemas/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"metricV40":{"$ref":"#/components/schemas/advisory.CVSSV40"}},"type":"object"},"api.ImpactExtended":{"description":"api.ImpactExtended","properties":{"baseMetricV2":{"$ref":"#/components/schemas/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"correctedBaseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"epss":{"$ref":"#/components/schemas/api.EPSS"},"metricV40":{"$ref":"#/components/schemas/advisory.CVSSV40"},"ssvc":{"items":{"$ref":"#/components/schemas/api.SSVC"},"type":"array","uniqueItems":false},"temporalMetricV2":{"$ref":"#/components/schemas/api.TemporalMetricV2"},"temporalMetricV3":{"$ref":"#/components/schemas/api.TemporalMetricV3"},"temporalV3Corrected":{"$ref":"#/components/schemas/api.TemporalMetricV3"},"threatMetricV40":{"$ref":"#/components/schemas/advisory.CVSSV40Threat"}},"type":"object"},"api.InitialAccess":{"description":"api.InitialAccess","properties":{"artifacts":{"description":"Artifacts holds the set of available artifacts for this vulnerability, such as exploit, shodan queries, PCAP traces, and others.","items":{"$ref":"#/components/schemas/api.InitialAccessArtifact"},"type":"array","uniqueItems":false},"cve":{"description":"CVE identifier for the given initial access record.","type":"string"},"inKEV":{"description":"InKEV is true if this artifact is in CISA's Known Exploited Vulnerabilities (KEV) data set; otherwise, false.","type":"boolean"},"inVCKEV":{"description":"InVCKEV is true if this artifact is in VulnCheck's Known Exploited Vulnerabilities (VCKEV) data set; otherwise, false.","type":"boolean"},"vulnerable_cpes":{"description":"VulnerableCPEs is the list of vulnerable CPE strings associated with this CVE and artifact(s).","items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.InitialAccessArtifact":{"description":"api.InitialAccessArtifact","properties":{"artifactName":{"description":"ArtifactName is a title to associate with this artifact.","type":"string"},"artifactsURL":{"description":"ArtifactsURL are URLs to the available artifact.","items":{"type":"string"},"type":"array","uniqueItems":false},"baiduQueries":{"description":"...","items":{"type":"string"},"type":"array","uniqueItems":false},"baiduRawQueries":{"description":"...","items":{"type":"string"},"type":"array","uniqueItems":false},"censysLegacyQueries":{"description":"CensysLegacyQueries are legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysLegacyRawQueries":{"description":"CensysLegacyRawQueries are raw legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysQueries":{"description":"CensysQueries are queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysRawQueries":{"description":"CensysRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array","uniqueItems":false},"chain":{"description":"Chain can represent the chain of exploitation.","items":{"type":"string"},"type":"array","uniqueItems":false},"cloneSSHURL":{"description":"CloneSSHURL is the git URL to clone the artifact with.","type":"string"},"dateAdded":{"description":"DateAdded is when this artifact entry was first added to the InitialAccess data set.","type":"string"},"driftnetQueries":{"description":"DriftnetQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array","uniqueItems":false},"driftnetRawQueries":{"description":"DriftnetRawQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array","uniqueItems":false},"exploit":{"description":"Exploit indicates whether or not an exploit is available in this artifact.","type":"boolean"},"fofaQueries":{"description":"FOFAQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with FOFA.","items":{"type":"string"},"type":"array","uniqueItems":false},"fofaRawQueries":{"items":{"type":"string"},"type":"array","uniqueItems":false},"googleQueries":{"description":"google queries","items":{"type":"string"},"type":"array","uniqueItems":false},"googleRawQueries":{"description":"raw google queries","items":{"type":"string"},"type":"array","uniqueItems":false},"greynoiseQueries":{"description":"GreynoiseQueries are queries for finding the vulnerability via honeypot data.","items":{"type":"string"},"type":"array","uniqueItems":false},"mitreAttackTechniques":{"description":"MITRE ATT\u0026CK techniques","items":{"type":"string"},"type":"array","uniqueItems":false},"nmapScript":{"description":"NmapScript indicates whether or not an nmap script for scanning environment exists in this artifact.","type":"boolean"},"pcap":{"description":"PCAP indicates whether of not a package capture of the exploit PoC exploiting a vulnerable system exists in this artifact.","type":"boolean"},"product":{"description":"Product are the software that has the vulnerability.","items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"description":"Related is a set of related cves.","items":{"type":"string"},"type":"array","uniqueItems":false},"shodanQueries":{"description":"ShodanQueries are queries for examining potential Internet-exposed devices \u0026 applications with Shodan in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"shodanRawQueries":{"description":"ShodanRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Shodan.","items":{"type":"string"},"type":"array","uniqueItems":false},"sigmaRule":{"description":"SigmaRule indicates whether or not a Sigma rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"snortRule":{"description":"SnortRule indicates whether or not a Snort rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"suricataRule":{"description":"SuricataRule indicates whether or not a Suricata rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"targetDocker":{"description":"TargetDocker indicates whether or not there is an available docker image with the vulnerability.","type":"boolean"},"targetEncryptedComms":{"description":"Encrypted communications?","type":"string"},"targetService":{"description":"TargetService indicates the service (HTTP, FTP, etc) that this exploit targets.","type":"string"},"vendor":{"description":"Vendor of the vulnerable product","type":"string"},"versionScanner":{"description":"VersionScanner indicates whether or not the exploit PoC can determine if target system is vulnerable without sending exploit payload in this artifact.","type":"boolean"},"yara":{"description":"YARA indicates whether or not a YARA rule designed to detect the exploit on an endpoint exists in this artifact.","type":"boolean"},"zeroday":{"description":"Zeroday indicates whether or not it is a VulnCheck zeroday.","type":"boolean"},"zoomEyeQueries":{"description":"ZoomEyeQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with ZoomEye.","items":{"type":"string"},"type":"array","uniqueItems":false},"zoomEyeRawQueries":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.MitreAttackTech":{"description":"api.MitreAttackTech","properties":{"d3fendmapping":{"items":{"$ref":"#/components/schemas/api.MitreMitigation2D3fendMapping"},"type":"array","uniqueItems":false},"detections":{"items":{"$ref":"#/components/schemas/api.MitreDetectionTech"},"type":"array","uniqueItems":false},"domain":{"type":"string"},"id":{"type":"string"},"mitigations":{"items":{"$ref":"#/components/schemas/api.MitreMitigationTech"},"type":"array","uniqueItems":false},"name":{"type":"string"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.MitreAttackToCVE":{"description":"api.MitreAttackToCVE","properties":{"cve_list":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"technique_id":{"$ref":"#/components/schemas/api.MitreAttackTech"}},"type":"object"},"api.MitreD3fendTechnique":{"description":"api.MitreD3fendTechnique","properties":{"id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.MitreDetectionTech":{"description":"api.MitreDetectionTech","properties":{"datacomponent":{"type":"string"},"datasource":{"type":"string"},"detects":{"type":"string"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigation2D3fendMapping":{"description":"api.MitreMitigation2D3fendMapping","properties":{"d3fendtechniques":{"items":{"$ref":"#/components/schemas/api.MitreD3fendTechnique"},"type":"array","uniqueItems":false},"id":{"type":"string"}},"type":"object"},"api.MitreMitigationTech":{"description":"api.MitreMitigationTech","properties":{"description":{"type":"string"},"id":{"type":"string"},"mitigation_url":{"type":"string"}},"type":"object"},"api.NVD20CPEMatch":{"description":"api.NVD20CPEMatch","properties":{"cpeLastModified":{"type":"string"},"created":{"type":"string"},"criteria":{"type":"string"},"lastModified":{"type":"string"},"matchCriteriaId":{"type":"string"},"matches":{"items":{"$ref":"#/components/schemas/api.NVD20CPEName"},"type":"array","uniqueItems":false},"status":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"}},"type":"object"},"api.NVD20CPEName":{"description":"api.NVD20CPEName","properties":{"cpeName":{"type":"string"},"cpeNameId":{"type":"string"}},"type":"object"},"api.NVD20CVE":{"description":"api.NVD20CVE","properties":{"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"descriptions":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/components/schemas/api.NVD20Metric"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/api.NVD20Reference"},"type":"array","uniqueItems":false},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vendorComments":{"items":{"$ref":"#/components/schemas/api.NVD20VendorComment"},"type":"array","uniqueItems":false},"vulnStatus":{"type":"string"},"weaknesses":{"items":{"$ref":"#/components/schemas/api.NVD20Weakness"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20CVEExtended":{"description":"api.NVD20CVEExtended","properties":{"ALIAS":{"type":"string"},"STATUS":{"type":"string"},"_timestamp":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"categorization":{"$ref":"#/components/schemas/api.CategorizationExtended"},"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"descriptions":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"documentGenerationDate":{"type":"string"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/components/schemas/api.NVD20MetricExtended"},"mitreAttackTechniques":{"items":{"$ref":"#/components/schemas/api.MitreAttackTech"},"type":"array","uniqueItems":false},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/api.NVD20ReferenceExtended"},"type":"array","uniqueItems":false},"relatedAttackPatterns":{"items":{"$ref":"#/components/schemas/api.RelatedAttackPattern"},"type":"array","uniqueItems":false},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vendorComments":{"items":{"$ref":"#/components/schemas/api.NVD20VendorComment"},"type":"array","uniqueItems":false},"vulnStatus":{"type":"string"},"vulncheckKEVExploitAdd":{"type":"string"},"vulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"weaknesses":{"items":{"$ref":"#/components/schemas/api.NVD20WeaknessExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20CvssDataV2":{"description":"api.NVD20CvssDataV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssDataV3":{"description":"api.NVD20CvssDataV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"environmentalSeverity":{"type":"string"},"exploitCodeMaturity":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedAvailabilityImpact":{"type":"string"},"modifiedConfidentialityImpact":{"type":"string"},"modifiedIntegrityImpact":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedScope":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"privilegesRequired":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"scope":{"type":"string"},"temporalScore":{"type":"number"},"temporalSeverity":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV2":{"description":"api.NVD20CvssMetricV2","properties":{"acInsufInfo":{"type":"boolean"},"baseSeverity":{"type":"string"},"cvssData":{"$ref":"#/components/schemas/api.NVD20CvssDataV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"source":{"type":"string"},"type":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.NVD20CvssMetricV3":{"description":"api.NVD20CvssMetricV3","properties":{"cvssData":{"$ref":"#/components/schemas/api.NVD20CvssDataV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV40":{"description":"api.NVD20CvssMetricV40","properties":{"cvssData":{"$ref":"#/components/schemas/advisory.CVSSV40"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20Description":{"description":"api.NVD20Description","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20Metric":{"description":"api.NVD20Metric","properties":{"cvssMetricV2":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV2"},"type":"array","uniqueItems":false},"cvssMetricV30":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV31":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV40":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV40"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20MetricExtended":{"description":"api.NVD20MetricExtended","properties":{"cvssMetricV2":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV2"},"type":"array","uniqueItems":false},"cvssMetricV30":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV31":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV40":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV40"},"type":"array","uniqueItems":false},"epss":{"$ref":"#/components/schemas/api.EPSS"},"ssvc":{"items":{"$ref":"#/components/schemas/api.SSVC"},"type":"array","uniqueItems":false},"temporalCVSSV2":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV2"},"temporalCVSSV2Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV2"},"type":"array","uniqueItems":false},"temporalCVSSV30":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"temporalCVSSV30Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"type":"array","uniqueItems":false},"temporalCVSSV31":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"temporalCVSSV31Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"type":"array","uniqueItems":false},"threatCVSSV40":{"$ref":"#/components/schemas/api.NVD20ThreatCVSSV40"},"threatCVSSV40Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20ThreatCVSSV40"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20Reference":{"description":"api.NVD20Reference","properties":{"source":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.NVD20ReferenceExtended":{"description":"api.NVD20ReferenceExtended","properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"source":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.NVD20TemporalAssociatedBaseMetric":{"description":"api.NVD20TemporalAssociatedBaseMetric","properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV2":{"description":"api.NVD20TemporalCVSSV2","properties":{"associatedBaseMetricV2":{"$ref":"#/components/schemas/api.NVD20TemporalAssociatedBaseMetric"},"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV3":{"description":"api.NVD20TemporalCVSSV3","properties":{"associatedBaseMetricV3":{"$ref":"#/components/schemas/api.NVD20TemporalAssociatedBaseMetric"},"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20ThreatAssociatedBaseMetric":{"description":"api.NVD20ThreatAssociatedBaseMetric","properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20ThreatCVSSV40":{"description":"api.NVD20ThreatCVSSV40","properties":{"associatedBaseMetricV40":{"$ref":"#/components/schemas/api.NVD20ThreatAssociatedBaseMetric"},"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"api.NVD20VendorComment":{"description":"api.NVD20VendorComment","properties":{"comment":{"type":"string"},"lastModified":{"type":"string"},"organization":{"type":"string"}},"type":"object"},"api.NVD20Weakness":{"description":"api.NVD20Weakness","properties":{"description":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20WeaknessDescExtended":{"description":"api.NVD20WeaknessDescExtended","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20WeaknessExtended":{"description":"api.NVD20WeaknessExtended","properties":{"description":{"items":{"$ref":"#/components/schemas/api.NVD20WeaknessDescExtended"},"type":"array","uniqueItems":false},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.Nodes":{"description":"api.Nodes","properties":{"children":{"items":{"$ref":"#/components/schemas/api.Nodes"},"type":"array","uniqueItems":false},"cpe_match":{"items":{"$ref":"#/components/schemas/api.CPEMatch"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"api.NormalizedExploitV3Entry":{"description":"api.NormalizedExploitV3Entry","properties":{"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"date_added":{"type":"string"},"exploit_availability":{"type":"string"},"exploit_maturity":{"type":"string"},"exploit_type":{"type":"string"},"name":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.NormalizedReportV3Entry":{"description":"api.NormalizedReportV3Entry","properties":{"date_added":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackage":{"description":"api.OSSPackage","properties":{"artifacts":{"$ref":"#/components/schemas/api.OSSPackageArtifacts"},"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"licenses":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array","uniqueItems":false},"research_attributes":{"$ref":"#/components/schemas/api.OSSPackageResearchAttributes"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"api.OSSPackageArtifacts":{"description":"api.OSSPackageArtifacts","properties":{"binary":{"items":{"$ref":"#/components/schemas/api.OSSPackageDownloadInfo"},"type":"array","uniqueItems":false},"source":{"items":{"$ref":"#/components/schemas/api.OSSPackageDownloadInfo"},"type":"array","uniqueItems":false}},"type":"object"},"api.OSSPackageDownloadInfo":{"description":"api.OSSPackageDownloadInfo","properties":{"hashes":{"items":{"$ref":"#/components/schemas/api.OSSPackageHashInfo"},"type":"array","uniqueItems":false},"reference":{"type":"string"},"type":{"description":"See OSSPackageDownloadInfoType* consts","type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackageHashInfo":{"description":"api.OSSPackageHashInfo","properties":{"algorithm":{"description":"See OSSPackageHashInfoAlgo* consts","type":"string"},"type":{"description":"See OSSPackageHashInfoType* consts","type":"string"},"value":{"description":"hex string digest or link to hash","type":"string"}},"type":"object"},"api.OSSPackageResearchAttributes":{"description":"api.OSSPackageResearchAttributes","properties":{"abandoned":{"type":"boolean"},"eol":{"type":"boolean"},"is_malicious":{"type":"boolean"},"malicious_source":{"type":"string"},"repo_hijackable":{"type":"boolean"},"squatted_package":{"type":"string"}},"type":"object"},"api.OSSPackageVulnerability":{"description":"api.OSSPackageVulnerability","properties":{"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"api.Package":{"description":"api.Package","properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.ProblemType":{"description":"api.ProblemType","properties":{"problemtype_data":{"items":{"$ref":"#/components/schemas/api.ProblemTypeData"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeData":{"description":"api.ProblemTypeData","properties":{"description":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDescription"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeDataExtended":{"description":"api.ProblemTypeDataExtended","properties":{"description":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDescriptionExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeDescription":{"description":"api.ProblemTypeDescription","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeDescriptionExtended":{"description":"api.ProblemTypeDescriptionExtended","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeExtended":{"description":"api.ProblemTypeExtended","properties":{"problemtype_data":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDataExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.Reference":{"description":"api.Reference","properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ReferenceData":{"description":"api.ReferenceData","properties":{"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.ReferenceDataExtended":{"description":"api.ReferenceDataExtended","properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.References":{"description":"api.References","properties":{"reference_data":{"items":{"$ref":"#/components/schemas/api.ReferenceData"},"type":"array","uniqueItems":false}},"type":"object"},"api.ReferencesExtended":{"description":"api.ReferencesExtended","properties":{"reference_data":{"description":"ExploitData []NormalizedExploit `json:\"exploit_data,omitempty\"`\n\t\tThreatActorData []ThreatActorExtended `json:\"threat_actor_data,omitempty\"`\n\t\tRansomwareData []RansomwareReferenceData `json:\"ransomware_data,omitempty\"`\n\t\tAdvisoryData []AdvisoryExtended `json:\"advisory_data,omitempty\"`\n\t\tIdentifierData []IdentifierExtended `json:\"identifier_data,omitempty\"`","items":{"$ref":"#/components/schemas/api.ReferenceDataExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.RelatedAttackPattern":{"description":"api.RelatedAttackPattern","properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"api.SSVC":{"description":"api.SSVC","properties":{"automatable":{"type":"string"},"exploitation":{"type":"string"},"source":{"type":"string"},"technicalImpact":{"type":"string"}},"type":"object"},"api.TemporalCVSSV2":{"description":"api.TemporalCVSSV2","properties":{"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalCVSSV3":{"description":"api.TemporalCVSSV3","properties":{"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalMetricV2":{"description":"api.TemporalMetricV2","properties":{"cvssV2":{"$ref":"#/components/schemas/api.TemporalCVSSV2"}},"type":"object"},"api.TemporalMetricV3":{"description":"api.TemporalMetricV3","properties":{"cvssV3":{"$ref":"#/components/schemas/api.TemporalCVSSV3"}},"type":"object"},"api.Update":{"description":"api.Update","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/components/schemas/api.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/api.Package"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/api.Reference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/components/schemas/api.DateTime"}},"type":"object"},"api.VulnCheckCanary":{"description":"api.VulnCheckCanary","properties":{"category":{"type":"string"},"client_fingerprints":{"$ref":"#/components/schemas/api.ClientFingerprints"},"cve":{"type":"string"},"dst_country":{"type":"string"},"http":{"$ref":"#/components/schemas/api.HTTPDetails"},"payload":{"type":"string"},"severity":{"type":"integer"},"signature":{"type":"string"},"signature_id":{"type":"integer"},"src_country":{"type":"string"},"src_ip":{"type":"string"},"src_port":{"type":"integer"},"timestamp":{"type":"string"}},"type":"object"},"api.VulnerabilityAlias":{"description":"api.VulnerabilityAlias","properties":{"alias":{"type":"string"},"cve":{"type":"string"},"reference_url":{"type":"string"}},"type":"object"},"backup.BackupResponse":{"description":"backup.BackupResponse","properties":{"available":{"type":"boolean"},"feed":{"type":"string"},"url":{"type":"string"},"url_direct":{"type":"string"},"url_expires":{"type":"string"}},"type":"object"},"backup.FeedItem":{"description":"backup.FeedItem","properties":{"available":{"type":"boolean"},"backup_written_at":{"type":"string"},"href":{"type":"string"},"name":{"type":"string"}},"type":"object"},"backup.ListBackupsResponse":{"description":"backup.ListBackupsResponse","properties":{"data":{"items":{"$ref":"#/components/schemas/backup.FeedItem"},"type":"array","uniqueItems":false}},"type":"object"},"models.Entitlements":{"description":"models.Entitlements","properties":{"entitlements":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Entitlements provides a map of roles to a list of entitlements","type":"object"}},"type":"object"},"paginate.Match":{"description":"paginate.Match","properties":{"field":{"type":"string"},"value":{"type":"string"}},"type":"object"},"paginate.Pagination":{"description":"paginate.Pagination","properties":{"cursor":{"description":"Cursor for the current page","type":"string"},"first_item":{"description":"First and last Item","type":"integer"},"index":{"description":"The requested index","type":"string"},"last_item":{"type":"integer"},"limit":{"description":"Per-Page limit","type":"integer"},"matches":{"items":{"$ref":"#/components/schemas/paginate.Match"},"type":"array","uniqueItems":false},"max_pages":{"type":"integer"},"next_cursor":{"description":"Cursor for the next page","type":"string"},"opensearch_query":{"type":"object"},"order":{"type":"string"},"page":{"description":"The current Page number","type":"integer"},"pages":{"items":{"type":"string"},"type":"array","uniqueItems":false},"parameters":{"items":{"$ref":"#/components/schemas/paginate.Param"},"type":"array","uniqueItems":false},"show_pages":{"type":"boolean"},"show_query":{"type":"boolean"},"sort":{"type":"string"},"timestamp":{"type":"string"},"total_documents":{"description":"The total number of items","type":"integer"},"total_pages":{"description":"The total number of pages","type":"integer"},"warnings":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"paginate.Param":{"description":"paginate.Param","properties":{"filtering":{"type":"string"},"format":{"type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexBackup":{"description":"params.IndexBackup","properties":{"date_added":{"type":"string"},"filename":{"type":"string"},"sha256":{"type":"string"},"url":{"type":"string"},"url_ap-southeast-2":{"type":"string"},"url_eu-west-2":{"type":"string"},"url_expires":{"type":"string"},"url_il-central-1":{"type":"string"},"url_me-central-1":{"type":"string"},"url_mrap":{"type":"string"},"url_ttl_minutes":{"type":"integer"},"url_us-east-1":{"type":"string"},"url_us-west-2":{"type":"string"}},"type":"object"},"params.IndexBackupList":{"description":"params.IndexBackupList","properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed backup information","type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexList":{"description":"params.IndexList","properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed index information","type":"string"},"name":{"type":"string"}},"type":"object"},"purl.BatchVulnFinding":{"description":"purl.BatchVulnFinding","properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array","uniqueItems":false},"purl":{"description":"the purl, ex. hex/coherence@0.1.2","type":"string"},"purl_struct":{"$ref":"#/components/schemas/purl.PackageURLJSON"},"research_attributes":{"$ref":"#/components/schemas/api.OSSPackageResearchAttributes"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"purl.PackageURLJSON":{"description":"meta-data about the purl","properties":{"name":{"type":"string"},"namespace":{"type":"string"},"qualifiers":{"items":{"$ref":"#/components/schemas/purl.QualifierJSON"},"type":"array","uniqueItems":false},"subpath":{"type":"string"},"type":{"type":"string"},"version":{"type":"string"}},"type":"object"},"purl.QualifierJSON":{"description":"purl.QualifierJSON","properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"purls.Artifact":{"description":"purls.Artifact","type":"object"},"purls.PurlResponse":{"description":"purls.PurlResponse","properties":{"artifacts":{"$ref":"#/components/schemas/purls.Artifact"},"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"licenses":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/purls.Vulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"purls.Vulnerability":{"description":"purls.Vulnerability","properties":{"arch":{"type":"string"},"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"render.Response-array_params_IndexBackupList":{"description":"render.Response-array_params_IndexBackupList","properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/components/schemas/params.IndexBackupList"},"type":"array","uniqueItems":false}},"type":"object"},"render.Response-array_params_IndexList":{"description":"render.Response-array_params_IndexList","properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/components/schemas/params.IndexList"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.A10"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ABBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AIX"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AMD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AMI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ASRG"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AVEVAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AVIDMLAdvs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AWS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Abbott"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Absolute"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Acronis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AdobeAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Advantech"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Advisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AdvisoryRecord"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlephResearch"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Alibaba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlmaLinuxUpdate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AmazonCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AnchoreNVDOverride"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AndroidAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheActiveMQ"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheArchiva"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheArrow"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCamel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCommons"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCouchDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheFlink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheGuacamole"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheHTTP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheHadoop"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheJSPWiki"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheKafka"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheLoggingServices"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheNiFi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOFBiz"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOpenMeetings"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOpenOffice"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApachePulsar"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheShiro"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSpark"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheStruts"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSubversion"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSuperset"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheTomcat"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheZooKeeper"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AppCheck"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Appgate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AppleAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ArchIssue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Arista"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Aruba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AssetNote"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Asterisk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Astra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Asus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AtlassianAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AtlassianVuln"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Atredis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Audiocodes"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AusCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Autodesk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Avaya"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Avigilon"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Axis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Azul"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BBraunAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BDUAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Bandr"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BaxterAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeckhoffAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeckmanCoulter"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BectonDickinsonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeldenAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeyondTrust"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Binarly"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BitDefender"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BlackBerry"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BoschAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BostonScientificAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Botnet"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CACyberCentreAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CBLMariner"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CERTEUAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CESA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CISAAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNNVDEntryJSON"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNVDBulletin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNVDFlaw"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CanvasExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CarestreamAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Carrier"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertBE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertFRAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertIN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertIRSecurityAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertSE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertUA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ChainGuard"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CheckPoint"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Chrome"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ciena"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CisaCsafAdv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoKnownGoodValue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CitrixAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ClarotyVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CloudBees"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CloudVulnDBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CodesysAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CommVault"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CompassSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ContainerOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CoreImpactExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Crestron"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CrowdSec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Curl"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Cvrf"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DFNCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DNN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dahua"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Danfoss"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dassault"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DebianSecurityAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DeltaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DistroPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Django"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DotCMS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DragosAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Draytek"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Drupal"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLAlibaba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLMicrosoft"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLReleaseData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EUVD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EatonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Elastic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Elspec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EmergingThreatsSnort"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EmersonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EndOfLife"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Endress"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ExodusIntel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ExploitDBExploitv2"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.F5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FSecure"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fanuc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fastly"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Festo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FileCloud"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FileZilla"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FlattSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ForgeRock"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FortinetAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FortinetIPS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Foxit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fresenius"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GCP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GEGas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GEHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GHAdvisoryJSONLean"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GHSA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GMOCyberSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gallagher"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gen"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Genetec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gigabyte"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitHubExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitLabExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GiteeExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitlabAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Glibc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GnuTLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GoVulnJSON"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Grafana"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GreyNoiseDetection"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HCL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HIKVision"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HKCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HMS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HPE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Hacktivity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HarmonyOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HashiCorp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HaskellSADBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HillromAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Hitachi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HitachiEnergy"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Honeywell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Huawei"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HuaweiEulerOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HuaweiIPS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IAVA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IBM"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ITWExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Idemia"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Igel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IncibeAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Intel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IpIntelRecord"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IsraeliAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IsraeliVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Istio"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ivanti"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IvantiRSS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JFrog"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JNJAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JVN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JVNAdvisoryItem"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Jenkins"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JetBrains"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JohnsonControls"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Juniper"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.K8S"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KEVCatalogVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KRCertAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KasperskyICSCERTAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KoreLogic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Kunbus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LG"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Lantronix"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Lenovo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LexmarkAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LibreOffice"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Linux"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LolAdvs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MACert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MFiles"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MaliciousPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousVSCodeExts-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MaliciousVSCodeExts-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MaliciousVSCodeExts"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ManageEngineAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MbedTLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.McAfee"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mediatek"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MedtronicAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mendix"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetaAdvisories"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetaData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetasploitExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftCVRF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftDriverBlockList"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftKb"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mikrotik"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mindray"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MispValue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mitel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitreCVEListV5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitsubishiElectricAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MongoDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MoxaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MozillaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NCSC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NCSCCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NEC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NHS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NTP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NVD20Source"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NVDCPEDictionary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NZAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Naver"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nessus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NetApp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netatalk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netgate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netgear"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netskope"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nexpose"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NginxAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NodeJS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NodeSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nokia"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NotePadPlusPlus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nozomi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nuclei"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OSV"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OTRS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OctopusDeploy"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Okta"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Omron"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OneE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenBSD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenCVDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenJDK"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenSSH"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenSSLSecAdv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenStack"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Opengear"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OracleCPU"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OracleCPUCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OwnCloud"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PHPMyAdmin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PKCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PTC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PacketstormExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Palantir"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PaloAltoAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Panasonic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PaperCut"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Pega"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PhilipsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PhoenixContactAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PostgresSQL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PowerDNS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Progress"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Proofpoint"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PureStorage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PyPAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QNAPAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QQID"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QSB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Qualcomm"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Qualys"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QualysQID"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RansomwareExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RedLion"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RedhatCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Renesas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Revive"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RhelCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Roche"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Rockwell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RockyErrata"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Rsync"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ruckus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RustsecAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SAP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SECConsult"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SSDAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Safran"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SaintExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SalesForce"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Samba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sandisk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SansDshield"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SchneiderElectricAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Schutzwerk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SecurityBulletin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SecurityLab"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SeebugExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SentinelOne"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ServiceNow"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SevenZip"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ShadowServerExploitedVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Shielder"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sick"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SiemensAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SierraWireless"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SigmaRule"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SingCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sitecore"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Slackware"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SolarWindsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Solr"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sonatype"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SonicWallAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SpacelabsHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Splunk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Spring"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Stormshield"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.StrykerAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sudo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SuseSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SwisslogHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Symfony"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Synacktiv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SyncroSoft"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Synology"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Syss"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TPLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TWCertAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tailscale"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TalosAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TeamViewer"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TenableResearchAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tencent"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Thales"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TheMissingLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ThermoFisher"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ThreatActorWithExternalObjects"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tibco"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TraneTechnology"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TrendMicro"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Trustwave"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.USD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.USOMAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ubiquiti"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.UbuntuCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Unify"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Unisoc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Update"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VCCPEDictionary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VCVulnerableCPEs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VDEAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VLC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VMWareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VYAIREAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VanDyke"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VapidLabsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Veeam"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Veritas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Virtuozzo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VoidSec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheck"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckCVEListV5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckConfig"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckKEV"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnerableDebianPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Vulnrichment"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WRT"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WatchGuard"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WhatsApp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wibu"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wireshark"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WithSecure"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WolfSSL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wolfi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wordfence"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xen"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xerox"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xiaomi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xylem"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Yamaha"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.YokogawaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Yubico"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zebra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ZeroDayAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ZeroScienceAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zimbra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zoom"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zscaler"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zuso"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zyxel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CWE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CveItems"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CveItemsExtended"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.EPSSData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitChain"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitV3Result"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitsChangelog"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.InitialAccess"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.MitreAttackToCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CPEMatch"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CVEExtended"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.OSSPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_Update-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_Update-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.Update"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.VulnCheckCanary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.VulnerabilityAlias"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/purls.PurlResponse"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata":{"description":"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.ResponseMetadata"},"data":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.BackupResponseMetadata"},"data":{"items":{"$ref":"#/components/schemas/params.IndexBackup"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.PurlResponseMetadata"},"data":{"$ref":"#/components/schemas/v3controllers.PurlResponseData"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.PurlsResponseMetadata"},"data":{"items":{"$ref":"#/components/schemas/purl.BatchVulnFinding"},"type":"array","uniqueItems":false}},"type":"object"},"search.ErrorResponse":{"description":"search.ErrorResponse","properties":{"error":{"type":"boolean"},"errors":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"search.V4AdvisoryMeta":{"description":"search.V4AdvisoryMeta","properties":{"cursor":{"type":"string"},"filtered":{"type":"integer"},"limit":{"type":"integer"},"next_cursor":{"type":"string"},"page":{"type":"integer"},"pages":{"type":"integer"},"total":{"type":"integer"}},"type":"object"},"search.V4AdvisoryReturnValue":{"description":"search.V4AdvisoryReturnValue","properties":{"_meta":{"$ref":"#/components/schemas/search.V4AdvisoryMeta"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"type":"array","uniqueItems":false}},"type":"object"},"search.V4FeedItem":{"description":"search.V4FeedItem","properties":{"description":{"type":"string"},"href":{"type":"string"},"name":{"type":"string"}},"type":"object"},"search.V4ListFeedReturnValue":{"description":"search.V4ListFeedReturnValue","properties":{"data":{"items":{"$ref":"#/components/schemas/search.V4FeedItem"},"type":"array","uniqueItems":false}},"type":"object"},"v3controllers.BackupResponseMetadata":{"description":"v3controllers.BackupResponseMetadata","properties":{"index":{"type":"string"},"timestamp":{"type":"string"}},"type":"object"},"v3controllers.PurlResponseData":{"description":"v3controllers.PurlResponseData","properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array","uniqueItems":false},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"v3controllers.PurlResponseMetadata":{"description":"v3controllers.PurlResponseMetadata","properties":{"purl_struct":{"$ref":"#/components/schemas/purl.PackageURLJSON"},"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.PurlsResponseMetadata":{"description":"v3controllers.PurlsResponseMetadata","properties":{"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.ResponseMetadata":{"description":"v3controllers.ResponseMetadata","properties":{"cpe":{"type":"string"},"cpe_struct":{"$ref":"#/components/schemas/api.CPE"},"timestamp":{"type":"string"},"total_documents":{"type":"integer"}},"type":"object"}},"securitySchemes":{"Bearer":{"in":"header","name":"Authorization","type":"apiKey"}}},"externalDocs":{"description":"","url":""},"info":{"contact":{"email":"support@vulncheck.com","name":"VulnCheck API Support"},"description":"VulnCheck API (v3 + v4)","termsOfService":"https://vulncheck.com/terms","title":"VulnCheck API","version":"latest"},"openapi":"3.1.0","paths":{"/v3/backup":{"get":{"description":"Return a list of indexes with backup and endpoint links that the user has access to","operationId":"backup_get","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.Response-array_params_IndexBackupList"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"oneOf":[{"type":"string"},{"type":"string"}]}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return a list of indexes with backup and endpoint links","tags":["endpoints"]}},"/v3/backup/{index}":{"get":{"description":"Retrieve a list of VulnCheck backups by index","operationId":"backup_index_get","parameters":[{"description":"Name of an exploit, vulnerability, or advisory index","in":"path","name":"index","required":true,"schema":{"enum":["7zip","a10","abb","abbott","absolute","acronis","adobe","advantech","advisories","aix","aleph-research","alibaba-advs","alma","alpine","alpine-purls","amazon","amazon-cve","amd","ami","anchore-nvd-override","android","apache-activemq","apache-archiva","apache-arrow","apache-camel","apache-commons","apache-couchdb","apache-flink","apache-guacamole","apache-hadoop","apache-http","apache-jspwiki","apache-kafka","apache-loggingservices","apache-nifi","apache-ofbiz","apache-openmeetings","apache-openoffice","apache-pulsar","apache-shiro","apache-spark","apache-struts","apache-subversion","apache-superset","apache-tomcat","apache-zookeeper","appcheck","appgate","apple","arch","arista","aruba","asrg","assetnote","asterisk","astra","asus","atlassian","atlassian-vulns","atredis","audiocodes","auscert","autodesk","avaya","aveva","avidml-advs","avigilon","aws","axis","azul","bandr","baxter","bbraun","bd","bdu","beckhoff","beckman-coulter","belden","beyond-trust","binarly","bitdefender","blackberry","bls","bosch","boston-scientific","botnets","ca-cyber-centre","canvas","carestream","cargo","carrier","cbl-mariner","centos","cert-be","cert-in","cert-ir-security-alerts","cert-se","cert-ua","certeu","certfr","chainguard","checkpoint","chrome","ciena","cisa-alerts","cisa-csaf","cisa-kev","cisco","cisco-csaf","cisco-known-good-values","cisco-talos","citrix","claroty","cloudbees","cloudvulndb","cnnvd","cnvd-bulletins","cnvd-flaws","cocoapods","codesys","commvault","compass-security","composer","conan","coreimpact","cpe-vulnerable","crestron","crowdsec","curl","cwe","dahua","danfoss","dassault","debian","debian-dsa","debian-packages","debian-purls","dell","delta","dfn-cert","django","dlink","dnn","dotcms","dragos","draytek","drupal","eaton","elastic","elspec","emerging-threats-snort","emerson","endoflife","endress","eol","eol-alibaba","eol-microsoft","epss","euvd","exodus-intel","exploit-chains","exploitdb","exploits","exploits-changelog","f-secure","f5","fanuc","fastly","fedora","festo","filecloud","filezilla","flatt-security","forgerock","fortinet","fortinet-ips","foxit","freebsd","fresenius","gallagher","gcp","ge-gas","ge-healthcare","gem","gen","genetec","ghsa","gigabyte","gitee-exploits","github-exploits","github-security-advisories","gitlab-advisories-community","gitlab-exploits","glibc","gmo-cybersecurity","gnutls","go-vulndb","golang","google-0day-itw","google-container-optimized-os","grafana","greynoise-metadata","hackage","hacktivity","harmonyos","hashicorp","haskell-sadb","hcl","hex","hikvision","hillrom","hitachi","hitachi-energy","hkcert","hms","honeywell","hp","hpe","huawei-euleros","huawei-ips","huawei-psirt","iava","ibm","idemia","igel","il-alerts","il-vulnerabilities","incibe","initial-access","initial-access-git","intel","ipintel-10d","ipintel-30d","ipintel-3d","ipintel-90d","istio","ivanti","ivanti-rss","jenkins","jetbrains","jfrog","jnj","johnson-controls","juniper","jvn","jvndb","kaspersky-ics-cert","korelogic","krcert-security-notices","krcert-vulnerabilities","kubernetes","kunbus","lantronix","lenovo","lexmark","lg","libre-office","linux","lol-advs","m-files","macert","malicious-packages","malicious-vscode-exts","manageengine","maven","mbed-tls","mcafee","mediatek","medtronic","mendix","meta-advisories","metasploit","microsoft-csaf","microsoft-cvrf","microsoft-driver-block-list","microsoft-kb","mikrotik","mindray","misp-threat-actors","mitel","mitre-attack-cve","mitre-cvelist-v5","mitsubishi-electric","mongodb","moxa","mozilla","naver","ncsc","ncsc-cves","nec","nessus","netapp","netatalk","netgate","netgear","netskope","nexpose","nginx","nhs","ni","nist-nvd","nist-nvd2","nist-nvd2-cpematch","nist-nvd2-sources","node-security","nodejs","nokia","notepadplusplus","nozomi","npm","ntp","nuclei","nuget","nvd-cpe-dictionary","nvidia","nz-advisories","octopus-deploy","okta","omron","one-e","opam","open-cvdb","openbsd","opengear","openjdk","openssh","openssl-secadv","openstack","openwrt","oracle","oracle-cpu","oracle-cpu-csaf","osv","otrs","owncloud","packetstorm","palantir","palo-alto","panasonic","papercut","pega","philips","phoenix-contact","php-my-admin","pkcert","postgressql","powerdns","progress","proofpoint","ptc","pub","pure-storage","pypa-advisories","pypi","qnap","qqids","qualcomm","qualys","qualys-qids","qubes-qsb","ransomware","red-lion","redhat","redhat-cves","renesas","revive","roche","rockwell","rocky","rocky-errata","rocky-purls","rsync","ruckus","rustsec-advisories","sacert","safran","saint","salesforce","samba","sandisk","sans-dshield","sap","schneider-electric","schutzwerk","sec-consult","securitylab","seebug","sel","sentinelone","servicenow","shadowserver-exploited","shielder","sick","siemens","sierra-wireless","sigmahq-sigma-rules","singcert","sitecore","slackware","solarwinds","solr","sonatype","sonicwall","spacelabs-healthcare","splunk","spring","ssd","stormshield","stryker","sudo","suse","suse-security","swift","swisslog-healthcare","symfony","synacktiv","syncrosoft","synology","syss","tailscale","teamviewer","tenable-research-advisories","tencent","thales","themissinglink","thermo-fisher","threat-actors","ti","tibco","tp-link","trane-technology","trendmicro","trustwave","twcert","ubiquiti","ubuntu","ubuntu-purls","unify","unisoc","usd","usom","vandyke","vapidlabs","vc-cpe-dictionary","vde","veeam","veritas","virtuozzo","vlc","vmware","voidsec","vulncheck","vulncheck-canaries","vulncheck-canaries-10d","vulncheck-canaries-30d","vulncheck-canaries-3d","vulncheck-canaries-90d","vulncheck-config","vulncheck-cvelist-v5","vulncheck-kev","vulncheck-nvd","vulncheck-nvd2","vulnerability-aliases","vulnrichment","vyaire","watchguard","whatsapp","wibu","wireshark","with-secure","wolfi","wolfssl","wordfence","xen","xerox","xiaomi","xylem","yamaha","yokogawa","yubico","zdi","zebra","zeroscience","zimbra","zoom","zscaler","zuso","zyxel"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve a list of backups by index","tags":["endpoints"]}},"/v3/cpe":{"get":{"description":"Based on the specified CPE (Common Platform Enumeration) URI string, this endpoint will return a list of vulnerabilities that are related to the package. We support v2.2 and v2.3","operationId":"cpe_get","parameters":[{"description":"CPE designation to lookup","in":"query","name":"cpe","required":true,"schema":{"type":"string"}},{"description":"Filter by vulnerability status (true/false). Defaults to false if not provided.","in":"query","name":"isVulnerable","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return CVE 's associated with a specific NIST CPE","tags":["endpoints"]}},"/v3/entitlements":{"get":{"description":"Retrieve entitlements for the current user","operationId":"entitlements_get","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/models.Entitlements"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve user entitlements","tags":["endpoints"]}},"/v3/index":{"get":{"description":"Return a list of available indexes with endpoint links that the user has access to","operationId":"index_get","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.Response-array_params_IndexList"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"oneOf":[{"type":"string"},{"type":"string"}]}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return a list of available indexes with endpoint links","tags":["endpoints"]}},"/v3/index/7zip":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the 7zip index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 7Zip Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/7zip?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/7zip?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_7zip_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"7zip\"","tags":["indices"]}},"/v3/index/a10":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the a10 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** A10 Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/a10?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/a10?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_a10_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"a10\"","tags":["indices"]}},"/v3/index/abb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ABB Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_abb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"abb\"","tags":["indices"]}},"/v3/index/abbott":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abbott index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Abbott Product Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abbott?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abbott?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_abbott_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"abbott\"","tags":["indices"]}},"/v3/index/absolute":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the absolute index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Absolute Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/absolute?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/absolute?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_absolute_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"absolute\"","tags":["indices"]}},"/v3/index/acronis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the acronis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Acronis Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/acronis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/acronis?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_acronis_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"acronis\"","tags":["indices"]}},"/v3/index/adobe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the adobe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Adobe Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/adobe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/adobe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_adobe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"adobe\"","tags":["indices"]}},"/v3/index/advantech":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advantech index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Advantech Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advantech?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advantech?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_advantech_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"advantech\"","tags":["indices"]}},"/v3/index/advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"advisories\"","tags":["indices"]}},"/v3/index/aix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AIX Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aix\"","tags":["indices"]}},"/v3/index/aleph-research":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aleph-research index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aleph Research Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aleph-research?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aleph-research?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aleph-research_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aleph-research\"","tags":["indices"]}},"/v3/index/alibaba-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alibaba-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alibaba-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alibaba-advs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alibaba-advs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alibaba-advs\"","tags":["indices"]}},"/v3/index/alma":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alma index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alma Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alma?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alma?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alma_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alma\"","tags":["indices"]}},"/v3/index/alpine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alpine_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alpine\"","tags":["indices"]}},"/v3/index/alpine-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alpine-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alpine-purls\"","tags":["indices"]}},"/v3/index/amazon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon Linux Security Center\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_amazon_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"amazon\"","tags":["indices"]}},"/v3/index/amazon-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon-cve?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_amazon-cve_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"amazon-cve\"","tags":["indices"]}},"/v3/index/amd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMD Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_amd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"amd\"","tags":["indices"]}},"/v3/index/ami":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ami index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMI Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ami?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ami?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ami_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ami\"","tags":["indices"]}},"/v3/index/anchore-nvd-override":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the anchore-nvd-override index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Anchore NVD Data Overrides\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/anchore-nvd-override?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/anchore-nvd-override?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_anchore-nvd-override_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"anchore-nvd-override\"","tags":["indices"]}},"/v3/index/android":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the android index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Android Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/android?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/android?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_android_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"android\"","tags":["indices"]}},"/v3/index/apache-activemq":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-activemq index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ActiveMQ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-activemq?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-activemq?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-activemq_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-activemq\"","tags":["indices"]}},"/v3/index/apache-archiva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-archiva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Archiva Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-archiva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-archiva?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-archiva_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-archiva\"","tags":["indices"]}},"/v3/index/apache-arrow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-arrow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Arrow Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-arrow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-arrow?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-arrow_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-arrow\"","tags":["indices"]}},"/v3/index/apache-camel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-camel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Camel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-camel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-camel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-camel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-camel\"","tags":["indices"]}},"/v3/index/apache-commons":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-commons index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Commons Known Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-commons?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-commons?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-commons_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-commons\"","tags":["indices"]}},"/v3/index/apache-couchdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-couchdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache CouchDB Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-couchdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-couchdb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-couchdb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-couchdb\"","tags":["indices"]}},"/v3/index/apache-flink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-flink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Flink Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-flink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-flink?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-flink_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-flink\"","tags":["indices"]}},"/v3/index/apache-guacamole":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-guacamole index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Guacamole Security Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-guacamole?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-guacamole?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-guacamole_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-guacamole\"","tags":["indices"]}},"/v3/index/apache-hadoop":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-hadoop index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Hadoop CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-hadoop?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-hadoop?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-hadoop_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-hadoop\"","tags":["indices"]}},"/v3/index/apache-http":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-http index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache HTTP Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-http?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-http?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-http_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-http\"","tags":["indices"]}},"/v3/index/apache-jspwiki":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-jspwiki index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache JSPWiki CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-jspwiki?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-jspwiki?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-jspwiki_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-jspwiki\"","tags":["indices"]}},"/v3/index/apache-kafka":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-kafka index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Kafka Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-kafka?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-kafka?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-kafka_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-kafka\"","tags":["indices"]}},"/v3/index/apache-loggingservices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-loggingservices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Logging Services Known Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-loggingservices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-loggingservices?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-loggingservices_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-loggingservices\"","tags":["indices"]}},"/v3/index/apache-nifi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-nifi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache NiFi Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-nifi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-nifi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-nifi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-nifi\"","tags":["indices"]}},"/v3/index/apache-ofbiz":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-ofbiz index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OFBiz Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-ofbiz?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-ofbiz?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-ofbiz_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-ofbiz\"","tags":["indices"]}},"/v3/index/apache-openmeetings":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openmeetings index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenMeetings Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openmeetings?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openmeetings?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-openmeetings_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-openmeetings\"","tags":["indices"]}},"/v3/index/apache-openoffice":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openoffice index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenOffice Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openoffice?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openoffice?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-openoffice_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-openoffice\"","tags":["indices"]}},"/v3/index/apache-pulsar":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-pulsar index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Pulsar Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-pulsar?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-pulsar?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-pulsar_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-pulsar\"","tags":["indices"]}},"/v3/index/apache-shiro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-shiro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Shiro Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-shiro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-shiro?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-shiro_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-shiro\"","tags":["indices"]}},"/v3/index/apache-spark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-spark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Spark Known Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-spark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-spark?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-spark_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-spark\"","tags":["indices"]}},"/v3/index/apache-struts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-struts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Struts Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-struts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-struts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-struts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-struts\"","tags":["indices"]}},"/v3/index/apache-subversion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-subversion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Subversion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-subversion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-subversion?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-subversion_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-subversion\"","tags":["indices"]}},"/v3/index/apache-superset":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-superset index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Superset CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-superset?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-superset?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-superset_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-superset\"","tags":["indices"]}},"/v3/index/apache-tomcat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-tomcat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Tomcat Security Vunlnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-tomcat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-tomcat?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-tomcat_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-tomcat\"","tags":["indices"]}},"/v3/index/apache-zookeeper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-zookeeper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ZooKeeper Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-zookeeper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-zookeeper?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-zookeeper_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-zookeeper\"","tags":["indices"]}},"/v3/index/appcheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appcheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AppCheck Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appcheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appcheck?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_appcheck_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"appcheck\"","tags":["indices"]}},"/v3/index/appgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Appgate SDP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appgate?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_appgate_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"appgate\"","tags":["indices"]}},"/v3/index/apple":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apple index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apple Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apple?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apple?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apple_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apple\"","tags":["indices"]}},"/v3/index/arch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arch Linux\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arch?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_arch_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"arch\"","tags":["indices"]}},"/v3/index/arista":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arista index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arista Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arista?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arista?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_arista_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"arista\"","tags":["indices"]}},"/v3/index/aruba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aruba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aruba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aruba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aruba?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aruba_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aruba\"","tags":["indices"]}},"/v3/index/asrg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asrg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASRG Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asrg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asrg?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_asrg_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"asrg\"","tags":["indices"]}},"/v3/index/assetnote":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the assetnote index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AssetNote Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/assetnote?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/assetnote?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_assetnote_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"assetnote\"","tags":["indices"]}},"/v3/index/asterisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asterisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Asterisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asterisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asterisk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_asterisk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"asterisk\"","tags":["indices"]}},"/v3/index/astra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the astra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Astra Linux Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/astra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/astra?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_astra_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"astra\"","tags":["indices"]}},"/v3/index/asus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASUSTek Computer Inc.\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_asus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"asus\"","tags":["indices"]}},"/v3/index/atlassian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_atlassian_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"atlassian\"","tags":["indices"]}},"/v3/index/atlassian-vulns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian-vulns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian-vulns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian-vulns?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_atlassian-vulns_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"atlassian-vulns\"","tags":["indices"]}},"/v3/index/atredis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atredis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atredis Partners Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atredis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atredis?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_atredis_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"atredis\"","tags":["indices"]}},"/v3/index/audiocodes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the audiocodes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AudioCodes Product Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/audiocodes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/audiocodes?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_audiocodes_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"audiocodes\"","tags":["indices"]}},"/v3/index/auscert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the auscert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AusCERT Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/auscert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/auscert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_auscert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"auscert\"","tags":["indices"]}},"/v3/index/autodesk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the autodesk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Autodesk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/autodesk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/autodesk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_autodesk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"autodesk\"","tags":["indices"]}},"/v3/index/avaya":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avaya index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avaya Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avaya?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avaya?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_avaya_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"avaya\"","tags":["indices"]}},"/v3/index/aveva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aveva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AVEVA Group Limited\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aveva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aveva?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aveva_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aveva\"","tags":["indices"]}},"/v3/index/avidml-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avidml-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AI Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avidml-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avidml-advs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_avidml-advs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"avidml-advs\"","tags":["indices"]}},"/v3/index/avigilon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avigilon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avigilon Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avigilon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avigilon?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_avigilon_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"avigilon\"","tags":["indices"]}},"/v3/index/aws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AWS Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aws?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aws_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aws\"","tags":["indices"]}},"/v3/index/axis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the axis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Axis OS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/axis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/axis?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_axis_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"axis\"","tags":["indices"]}},"/v3/index/azul":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the azul index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Azul Common Vulnerabilities and Exposures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/azul?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/azul?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_azul_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"azul\"","tags":["indices"]}},"/v3/index/bandr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bandr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B\u0026R Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bandr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bandr?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bandr_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bandr\"","tags":["indices"]}},"/v3/index/baxter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the baxter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Baxter Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/baxter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/baxter?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_baxter_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"baxter\"","tags":["indices"]}},"/v3/index/bbraun":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bbraun index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B. Braun Medical Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bbraun?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bbraun?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bbraun_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bbraun\"","tags":["indices"]}},"/v3/index/bd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Becton Dickinson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bd\"","tags":["indices"]}},"/v3/index/bdu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bdu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BDU Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bdu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bdu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bdu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bdu\"","tags":["indices"]}},"/v3/index/beckhoff":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckhoff index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckhoff Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckhoff?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckhoff?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_beckhoff_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"beckhoff\"","tags":["indices"]}},"/v3/index/beckman-coulter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckman-coulter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckman Coulter Product Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckman-coulter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckman-coulter?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_beckman-coulter_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"beckman-coulter\"","tags":["indices"]}},"/v3/index/belden":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the belden index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Belden Security Bulletins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/belden?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/belden?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_belden_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"belden\"","tags":["indices"]}},"/v3/index/beyond-trust":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beyond-trust index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beyond Trust Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beyond-trust?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beyond-trust?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_beyond-trust_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"beyond-trust\"","tags":["indices"]}},"/v3/index/binarly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the binarly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Binarly Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/binarly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/binarly?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_binarly_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"binarly\"","tags":["indices"]}},"/v3/index/bitdefender":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bitdefender index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bitdefender Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bitdefender?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bitdefender?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bitdefender_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bitdefender\"","tags":["indices"]}},"/v3/index/blackberry":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the blackberry index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BlackBerry Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/blackberry?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/blackberry?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_blackberry_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"blackberry\"","tags":["indices"]}},"/v3/index/bls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Black Lantern Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bls\"","tags":["indices"]}},"/v3/index/bosch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bosch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bosch Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bosch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bosch?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bosch_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bosch\"","tags":["indices"]}},"/v3/index/boston-scientific":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the boston-scientific index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Boston Scientific Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/boston-scientific?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/boston-scientific?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_boston-scientific_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"boston-scientific\"","tags":["indices"]}},"/v3/index/botnets":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the botnets index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Botnets\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/botnets?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/botnets?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_botnets_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"botnets\"","tags":["indices"]}},"/v3/index/ca-cyber-centre":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ca-cyber-centre index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Canadian Centre for Cyber Security Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ca-cyber-centre?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ca-cyber-centre?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ca-cyber-centre_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ca-cyber-centre\"","tags":["indices"]}},"/v3/index/canvas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the canvas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CANVAS Exploit Packs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/canvas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/canvas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_canvas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"canvas\"","tags":["indices"]}},"/v3/index/carestream":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carestream index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carestream Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carestream?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carestream?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_carestream_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"carestream\"","tags":["indices"]}},"/v3/index/cargo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cargo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cargo (Rust) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cargo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cargo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cargo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cargo\"","tags":["indices"]}},"/v3/index/carrier":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carrier index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carrier Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carrier?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carrier?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_carrier_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"carrier\"","tags":["indices"]}},"/v3/index/cbl-mariner":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cbl-mariner index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CBL-Mariner Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cbl-mariner?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cbl-mariner?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cbl-mariner_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cbl-mariner\"","tags":["indices"]}},"/v3/index/centos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the centos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CentOS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/centos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/centos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_centos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"centos\"","tags":["indices"]}},"/v3/index/cert-be":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-be index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert BE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-be?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-be?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-be_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-be\"","tags":["indices"]}},"/v3/index/cert-in":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-in index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT IN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-in?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-in?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-in_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-in\"","tags":["indices"]}},"/v3/index/cert-ir-security-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ir-security-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert IR Security Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ir-security-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ir-security-alerts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-ir-security-alerts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-ir-security-alerts\"","tags":["indices"]}},"/v3/index/cert-se":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-se index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert SE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-se?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-se?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-se_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-se\"","tags":["indices"]}},"/v3/index/cert-ua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert UA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ua?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-ua_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-ua\"","tags":["indices"]}},"/v3/index/certeu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certeu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT-EU The Computer Emergency Response Team for the EU Institutions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certeu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certeu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_certeu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"certeu\"","tags":["indices"]}},"/v3/index/certfr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certfr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert FR Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certfr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certfr?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_certfr_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"certfr\"","tags":["indices"]}},"/v3/index/chainguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chainguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ChainGuard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chainguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chainguard?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_chainguard_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"chainguard\"","tags":["indices"]}},"/v3/index/checkpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the checkpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CheckPoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/checkpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/checkpoint?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_checkpoint_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"checkpoint\"","tags":["indices"]}},"/v3/index/chrome":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chrome index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Google Chrome Release Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chrome?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chrome?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_chrome_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"chrome\"","tags":["indices"]}},"/v3/index/ciena":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ciena index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ciena\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ciena?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ciena?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ciena_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ciena\"","tags":["indices"]}},"/v3/index/cisa-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-alerts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisa-alerts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisa-alerts\"","tags":["indices"]}},"/v3/index/cisa-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories - CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisa-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisa-csaf\"","tags":["indices"]}},"/v3/index/cisa-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA KEV (Known Exploited Vulnerabilities)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-kev?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisa-kev_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisa-kev\"","tags":["indices"]}},"/v3/index/cisco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco\"","tags":["indices"]}},"/v3/index/cisco-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco-csaf\"","tags":["indices"]}},"/v3/index/cisco-known-good-values":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-known-good-values index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Known Good Values\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-known-good-values?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-known-good-values?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco-known-good-values_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco-known-good-values\"","tags":["indices"]}},"/v3/index/cisco-talos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-talos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Talos Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-talos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-talos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco-talos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco-talos\"","tags":["indices"]}},"/v3/index/citrix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the citrix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Citrix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/citrix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/citrix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_citrix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"citrix\"","tags":["indices"]}},"/v3/index/claroty":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the claroty index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Team 82: The Claroty Research Team\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/claroty?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/claroty?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_claroty_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"claroty\"","tags":["indices"]}},"/v3/index/cloudbees":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudbees index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudBees Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudbees?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudbees?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cloudbees_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cloudbees\"","tags":["indices"]}},"/v3/index/cloudvulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudvulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudVulnDB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudvulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudvulndb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cloudvulndb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cloudvulndb\"","tags":["indices"]}},"/v3/index/cnnvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnnvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Chinese National Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnnvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnnvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cnnvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cnnvd\"","tags":["indices"]}},"/v3/index/cnvd-bulletins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-bulletins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-bulletins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-bulletins?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cnvd-bulletins_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cnvd-bulletins\"","tags":["indices"]}},"/v3/index/cnvd-flaws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-flaws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Flaws\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-flaws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-flaws?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cnvd-flaws_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cnvd-flaws\"","tags":["indices"]}},"/v3/index/cocoapods":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cocoapods index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CocoaPods packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cocoapods?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cocoapods?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cocoapods_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cocoapods\"","tags":["indices"]}},"/v3/index/codesys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the codesys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Codesys Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/codesys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/codesys?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_codesys_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"codesys\"","tags":["indices"]}},"/v3/index/commvault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the commvault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Commvault Cloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/commvault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/commvault?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_commvault_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"commvault\"","tags":["indices"]}},"/v3/index/compass-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the compass-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Compass Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/compass-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/compass-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_compass-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"compass-security\"","tags":["indices"]}},"/v3/index/composer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the composer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PHP Composer packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/composer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/composer?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_composer_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"composer\"","tags":["indices"]}},"/v3/index/conan":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the conan index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** C/C++ packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/conan?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/conan?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_conan_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"conan\"","tags":["indices"]}},"/v3/index/coreimpact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the coreimpact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Core Impact\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/coreimpact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/coreimpact?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_coreimpact_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"coreimpact\"","tags":["indices"]}},"/v3/index/cpe-vulnerable":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cpe-vulnerable index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unrolled VulnCheck CPEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cpe-vulnerable?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cpe-vulnerable?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cpe-vulnerable_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cpe-vulnerable\"","tags":["indices"]}},"/v3/index/crestron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crestron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Crestron Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crestron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crestron?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_crestron_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"crestron\"","tags":["indices"]}},"/v3/index/crowdsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crowdsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CrowdSec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crowdsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crowdsec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_crowdsec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"crowdsec\"","tags":["indices"]}},"/v3/index/curl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the curl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Curl CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/curl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/curl?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_curl_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"curl\"","tags":["indices"]}},"/v3/index/cwe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cwe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Common Weakness Enumeration Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cwe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cwe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cwe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CWE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cwe\"","tags":["indices"]}},"/v3/index/dahua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dahua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dahua Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dahua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dahua?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dahua_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dahua\"","tags":["indices"]}},"/v3/index/danfoss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the danfoss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Danfoss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/danfoss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/danfoss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_danfoss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"danfoss\"","tags":["indices"]}},"/v3/index/dassault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dassault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dassault Systèmes Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dassault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dassault?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dassault_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dassault\"","tags":["indices"]}},"/v3/index/debian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian\"","tags":["indices"]}},"/v3/index/debian-dsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-dsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-dsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-dsa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian-dsa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian-dsa\"","tags":["indices"]}},"/v3/index/debian-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-packages?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian-packages_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian-packages\"","tags":["indices"]}},"/v3/index/debian-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian PURLs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian-purls\"","tags":["indices"]}},"/v3/index/dell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dell Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dell?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dell_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dell\"","tags":["indices"]}},"/v3/index/delta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the delta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Delta Controls Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/delta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/delta?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_delta_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"delta\"","tags":["indices"]}},"/v3/index/dfn-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dfn-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DFN-CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dfn-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dfn-cert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dfn-cert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dfn-cert\"","tags":["indices"]}},"/v3/index/django":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the django index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Django Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/django?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/django?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_django_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"django\"","tags":["indices"]}},"/v3/index/dlink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dlink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DLink Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dlink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dlink?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dlink_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dlink\"","tags":["indices"]}},"/v3/index/dnn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dnn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DNN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dnn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dnn?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dnn_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dnn\"","tags":["indices"]}},"/v3/index/dotcms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dotcms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DotCMS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dotcms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dotcms?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dotcms_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dotcms\"","tags":["indices"]}},"/v3/index/dragos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dragos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dragos Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dragos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dragos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dragos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dragos\"","tags":["indices"]}},"/v3/index/draytek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the draytek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DrayTek Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/draytek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/draytek?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_draytek_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"draytek\"","tags":["indices"]}},"/v3/index/drupal":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the drupal index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Drupal Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/drupal?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/drupal?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_drupal_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"drupal\"","tags":["indices"]}},"/v3/index/eaton":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eaton index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Eaton Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eaton?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eaton?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eaton_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eaton\"","tags":["indices"]}},"/v3/index/elastic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elastic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elastic Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elastic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elastic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_elastic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"elastic\"","tags":["indices"]}},"/v3/index/elspec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elspec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elspec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elspec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elspec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_elspec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"elspec\"","tags":["indices"]}},"/v3/index/emerging-threats-snort":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerging-threats-snort index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerging Threats Snort\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerging-threats-snort?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerging-threats-snort?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_emerging-threats-snort_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"emerging-threats-snort\"","tags":["indices"]}},"/v3/index/emerson":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerson index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerson Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerson?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerson?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_emerson_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"emerson\"","tags":["indices"]}},"/v3/index/endoflife":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endoflife index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** End Of Life\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endoflife?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endoflife?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_endoflife_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"endoflife\"","tags":["indices"]}},"/v3/index/endress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Endress \u0026 Hauser Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endress?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_endress_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"endress\"","tags":["indices"]}},"/v3/index/eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck EOL Coverage\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eol_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eol\"","tags":["indices"]}},"/v3/index/eol-alibaba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-alibaba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-alibaba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-alibaba?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eol-alibaba_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eol-alibaba\"","tags":["indices"]}},"/v3/index/eol-microsoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-microsoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-microsoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-microsoft?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eol-microsoft_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eol-microsoft\"","tags":["indices"]}},"/v3/index/epss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the epss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** EPSS Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/epss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/epss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_epss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"epss\"","tags":["indices"]}},"/v3/index/euvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the euvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** European Union Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/euvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/euvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_euvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"euvd\"","tags":["indices"]}},"/v3/index/exodus-intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exodus-intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Exodus Intelligence Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exodus-intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exodus-intel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exodus-intel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exodus-intel\"","tags":["indices"]}},"/v3/index/exploit-chains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploit-chains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Chains\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploit-chains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploit-chains?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploit-chains_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploit-chains\"","tags":["indices"]}},"/v3/index/exploitdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploitdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Exploit Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploitdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploitdb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploitdb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploitdb\"","tags":["indices"]}},"/v3/index/exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Intelligence Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploits\"","tags":["indices"]}},"/v3/index/exploits-changelog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits-changelog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Changelog for VC Exploits Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits-changelog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits-changelog?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploits-changelog_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploits-changelog\"","tags":["indices"]}},"/v3/index/f-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F-Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f-secure?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_f-secure_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"f-secure\"","tags":["indices"]}},"/v3/index/f5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F5 Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f5?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_f5_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"f5\"","tags":["indices"]}},"/v3/index/fanuc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fanuc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fanuc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fanuc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fanuc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fanuc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fanuc\"","tags":["indices"]}},"/v3/index/fastly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fastly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fastly Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fastly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fastly?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fastly_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fastly\"","tags":["indices"]}},"/v3/index/fedora":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fedora index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fedora Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fedora?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fedora?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fedora_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fedora\"","tags":["indices"]}},"/v3/index/festo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the festo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Festo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/festo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/festo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_festo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"festo\"","tags":["indices"]}},"/v3/index/filecloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filecloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filecloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filecloud?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_filecloud_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"filecloud\"","tags":["indices"]}},"/v3/index/filezilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filezilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileZilla Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filezilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filezilla?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_filezilla_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"filezilla\"","tags":["indices"]}},"/v3/index/flatt-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the flatt-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Flatt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/flatt-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/flatt-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_flatt-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"flatt-security\"","tags":["indices"]}},"/v3/index/forgerock":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the forgerock index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ForgeRock Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/forgerock?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/forgerock?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_forgerock_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"forgerock\"","tags":["indices"]}},"/v3/index/fortinet":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FortiGuard Fortinet\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fortinet_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fortinet\"","tags":["indices"]}},"/v3/index/fortinet-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fortinet Labs Threat Encyclopedia\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet-ips?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fortinet-ips_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fortinet-ips\"","tags":["indices"]}},"/v3/index/foxit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the foxit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Foxit Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/foxit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/foxit?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_foxit_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"foxit\"","tags":["indices"]}},"/v3/index/freebsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the freebsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FreeBSD Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/freebsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/freebsd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_freebsd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"freebsd\"","tags":["indices"]}},"/v3/index/fresenius":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fresenius index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fresenius Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fresenius?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fresenius?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fresenius_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fresenius\"","tags":["indices"]}},"/v3/index/gallagher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gallagher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gallagher Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gallagher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gallagher?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gallagher_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gallagher\"","tags":["indices"]}},"/v3/index/gcp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gcp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GCP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gcp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gcp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gcp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gcp\"","tags":["indices"]}},"/v3/index/ge-gas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-gas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Gas Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-gas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-gas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ge-gas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ge-gas\"","tags":["indices"]}},"/v3/index/ge-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Healthcare Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ge-healthcare_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ge-healthcare\"","tags":["indices"]}},"/v3/index/gem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruby (gem) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gem?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gem_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gem\"","tags":["indices"]}},"/v3/index/gen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gen Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gen?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gen_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gen\"","tags":["indices"]}},"/v3/index/genetec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the genetec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Genetec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/genetec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/genetec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_genetec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"genetec\"","tags":["indices"]}},"/v3/index/ghsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ghsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GHSA\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ghsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ghsa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ghsa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ghsa\"","tags":["indices"]}},"/v3/index/gigabyte":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gigabyte index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GIGABYTE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gigabyte?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gigabyte?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gigabyte_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gigabyte\"","tags":["indices"]}},"/v3/index/gitee-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitee-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gitee Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitee-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitee-exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gitee-exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gitee-exploits\"","tags":["indices"]}},"/v3/index/github-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitHub Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_github-exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"github-exploits\"","tags":["indices"]}},"/v3/index/github-security-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-security-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Github Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-security-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-security-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_github-security-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"github-security-advisories\"","tags":["indices"]}},"/v3/index/gitlab-advisories-community":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-advisories-community index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Advisory Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-advisories-community?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-advisories-community?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gitlab-advisories-community_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gitlab-advisories-community\"","tags":["indices"]}},"/v3/index/gitlab-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gitlab-exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gitlab-exploits\"","tags":["indices"]}},"/v3/index/glibc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the glibc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Glibc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/glibc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/glibc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_glibc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"glibc\"","tags":["indices"]}},"/v3/index/gmo-cybersecurity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gmo-cybersecurity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GMO Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gmo-cybersecurity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gmo-cybersecurity?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gmo-cybersecurity_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gmo-cybersecurity\"","tags":["indices"]}},"/v3/index/gnutls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gnutls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GnuTLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gnutls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gnutls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gnutls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gnutls\"","tags":["indices"]}},"/v3/index/go-vulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the go-vulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Go Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/go-vulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/go-vulndb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_go-vulndb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"go-vulndb\"","tags":["indices"]}},"/v3/index/golang":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the golang index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Golang packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/golang?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/golang?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_golang_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"golang\"","tags":["indices"]}},"/v3/index/google-0day-itw":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-0day-itw index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Project Zero In the Wild Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-0day-itw?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-0day-itw?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_google-0day-itw_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"google-0day-itw\"","tags":["indices"]}},"/v3/index/google-container-optimized-os":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-container-optimized-os index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Container OS Release Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-container-optimized-os?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-container-optimized-os?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_google-container-optimized-os_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"google-container-optimized-os\"","tags":["indices"]}},"/v3/index/grafana":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the grafana index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Grafana Labs Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/grafana?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/grafana?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_grafana_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"grafana\"","tags":["indices"]}},"/v3/index/greynoise-metadata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the greynoise-metadata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GreyNoise Metadata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/greynoise-metadata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/greynoise-metadata?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_greynoise-metadata_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"greynoise-metadata\"","tags":["indices"]}},"/v3/index/hackage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hackage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackage (Haskell) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hackage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hackage?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hackage_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hackage\"","tags":["indices"]}},"/v3/index/hacktivity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hacktivity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackerone Hacktivity\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hacktivity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hacktivity?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hacktivity_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hacktivity\"","tags":["indices"]}},"/v3/index/harmonyos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the harmonyos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HarmonyOS Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/harmonyos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/harmonyos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_harmonyos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"harmonyos\"","tags":["indices"]}},"/v3/index/hashicorp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hashicorp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HashiCorp Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hashicorp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hashicorp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hashicorp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hashicorp\"","tags":["indices"]}},"/v3/index/haskell-sadb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the haskell-sadb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Haskell Security Advisory DB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/haskell-sadb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/haskell-sadb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_haskell-sadb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"haskell-sadb\"","tags":["indices"]}},"/v3/index/hcl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hcl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HCLSoftware Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hcl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hcl?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hcl_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hcl\"","tags":["indices"]}},"/v3/index/hex":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hex index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hex (Erlang) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hex?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hex?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hex_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hex\"","tags":["indices"]}},"/v3/index/hikvision":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hikvision index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hikvision Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hikvision?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hikvision?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hikvision_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hikvision\"","tags":["indices"]}},"/v3/index/hillrom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hillrom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hillrom Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hillrom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hillrom?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hillrom_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hillrom\"","tags":["indices"]}},"/v3/index/hitachi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Software Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hitachi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hitachi\"","tags":["indices"]}},"/v3/index/hitachi-energy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi-energy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Energy Cybersecurity Advisories and Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi-energy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi-energy?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hitachi-energy_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hitachi-energy\"","tags":["indices"]}},"/v3/index/hkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hong Kong CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hkcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hkcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hkcert\"","tags":["indices"]}},"/v3/index/hms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HMS (Hardware Meets Software) Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hms?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hms_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hms\"","tags":["indices"]}},"/v3/index/honeywell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Honeywell Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/honeywell?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_honeywell_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"honeywell\"","tags":["indices"]}},"/v3/index/hp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hp\"","tags":["indices"]}},"/v3/index/hpe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HPE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hpe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hpe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hpe\"","tags":["indices"]}},"/v3/index/huawei-euleros":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenEuler Operating System Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-euleros?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_huawei-euleros_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"huawei-euleros\"","tags":["indices"]}},"/v3/index/huawei-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei IPS Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-ips?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_huawei-ips_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"huawei-ips\"","tags":["indices"]}},"/v3/index/huawei-psirt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-psirt?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_huawei-psirt_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"huawei-psirt\"","tags":["indices"]}},"/v3/index/iava":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the iava index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Information Assurance Vulnerability Alerts (IAVA)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/iava?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_iava_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"iava\"","tags":["indices"]}},"/v3/index/ibm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IBM Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ibm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ibm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ibm\"","tags":["indices"]}},"/v3/index/idemia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Idemia Product Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/idemia?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_idemia_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"idemia\"","tags":["indices"]}},"/v3/index/igel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the igel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IGEL Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/igel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_igel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"igel\"","tags":["indices"]}},"/v3/index/il-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-alerts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_il-alerts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"il-alerts\"","tags":["indices"]}},"/v3/index/il-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il CVE Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_il-vulnerabilities_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"il-vulnerabilities\"","tags":["indices"]}},"/v3/index/incibe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Incibe CERT Early Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/incibe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_incibe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"incibe\"","tags":["indices"]}},"/v3/index/initial-access":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_initial-access_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"initial-access\"","tags":["indices"]}},"/v3/index/initial-access-git":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access-git?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_initial-access-git_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"initial-access-git\"","tags":["indices"]}},"/v3/index/intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Intel® Product Security Center Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/intel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_intel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"intel\"","tags":["indices"]}},"/v3/index/ipintel-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-10d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-10d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-10d\"","tags":["indices"]}},"/v3/index/ipintel-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-30d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-30d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-30d\"","tags":["indices"]}},"/v3/index/ipintel-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-3d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-3d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-3d\"","tags":["indices"]}},"/v3/index/ipintel-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-90d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-90d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-90d\"","tags":["indices"]}},"/v3/index/istio":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the istio index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Istio Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/istio?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_istio_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"istio\"","tags":["indices"]}},"/v3/index/ivanti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ivanti_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ivanti\"","tags":["indices"]}},"/v3/index/ivanti-rss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti-rss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ivanti-rss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ivanti-rss\"","tags":["indices"]}},"/v3/index/jenkins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Jenkins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jenkins?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jenkins_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jenkins\"","tags":["indices"]}},"/v3/index/jetbrains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JetBrains Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jetbrains?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jetbrains_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jetbrains\"","tags":["indices"]}},"/v3/index/jfrog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JFrog Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jfrog?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jfrog_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jfrog\"","tags":["indices"]}},"/v3/index/jnj":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Johnson \u0026 Johnson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jnj?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jnj_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jnj\"","tags":["indices"]}},"/v3/index/johnson-controls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Advisories - Johnson Controls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/johnson-controls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_johnson-controls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"johnson-controls\"","tags":["indices"]}},"/v3/index/juniper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Juniper Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/juniper?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_juniper_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"juniper\"","tags":["indices"]}},"/v3/index/jvn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvn?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jvn_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jvn\"","tags":["indices"]}},"/v3/index/jvndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvndb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jvndb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jvndb\"","tags":["indices"]}},"/v3/index/kaspersky-ics-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kaspersky ICS CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kaspersky-ics-cert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_kaspersky-ics-cert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"kaspersky-ics-cert\"","tags":["indices"]}},"/v3/index/korelogic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KoreLogic Vulnerability Research and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/korelogic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_korelogic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"korelogic\"","tags":["indices"]}},"/v3/index/krcert-security-notices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-security-notices?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_krcert-security-notices_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"krcert-security-notices\"","tags":["indices"]}},"/v3/index/krcert-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_krcert-vulnerabilities_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"krcert-vulnerabilities\"","tags":["indices"]}},"/v3/index/kubernetes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kubernetes Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kubernetes?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_kubernetes_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"kubernetes\"","tags":["indices"]}},"/v3/index/kunbus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KunBus Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kunbus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_kunbus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"kunbus\"","tags":["indices"]}},"/v3/index/lantronix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lantronix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lantronix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lantronix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lantronix\"","tags":["indices"]}},"/v3/index/lenovo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lenovo Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lenovo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lenovo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lenovo\"","tags":["indices"]}},"/v3/index/lexmark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lexmark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lexmark?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lexmark_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lexmark\"","tags":["indices"]}},"/v3/index/lg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** LG Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lg?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lg_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lg\"","tags":["indices"]}},"/v3/index/libre-office":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Libre Office Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/libre-office?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_libre-office_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"libre-office\"","tags":["indices"]}},"/v3/index/linux":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the linux index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Linux Kernel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/linux?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_linux_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"linux\"","tags":["indices"]}},"/v3/index/lol-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Living Off the Land Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lol-advs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lol-advs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lol-advs\"","tags":["indices"]}},"/v3/index/m-files":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** M-Files Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/m-files?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_m-files_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"m-files\"","tags":["indices"]}},"/v3/index/macert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the macert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moroccan CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/macert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_macert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"macert\"","tags":["indices"]}},"/v3/index/malicious-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-packages?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_malicious-packages_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"malicious-packages\"","tags":["indices"]}},"/v3/index/malicious-vscode-exts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Visual Studio Code Extensions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-vscode-exts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_malicious-vscode-exts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MaliciousVSCodeExts-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"malicious-vscode-exts\"","tags":["indices"]}},"/v3/index/manageengine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ManageEngine Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/manageengine?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_manageengine_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"manageengine\"","tags":["indices"]}},"/v3/index/maven":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the maven index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Maven (Java) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/maven?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_maven_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"maven\"","tags":["indices"]}},"/v3/index/mbed-tls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mbed TLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mbed-tls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mbed-tls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mbed-tls\"","tags":["indices"]}},"/v3/index/mcafee":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** McAfee Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mcafee?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mcafee_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mcafee\"","tags":["indices"]}},"/v3/index/mediatek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MediaTek Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mediatek?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mediatek_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mediatek\"","tags":["indices"]}},"/v3/index/medtronic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Medtronic Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/medtronic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_medtronic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"medtronic\"","tags":["indices"]}},"/v3/index/mendix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mendix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mendix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mendix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mendix\"","tags":["indices"]}},"/v3/index/meta-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Meta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/meta-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_meta-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"meta-advisories\"","tags":["indices"]}},"/v3/index/metasploit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Metasploit Modules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/metasploit?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_metasploit_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"metasploit\"","tags":["indices"]}},"/v3/index/microsoft-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-csaf\"","tags":["indices"]}},"/v3/index/microsoft-cvrf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-cvrf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-cvrf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-cvrf\"","tags":["indices"]}},"/v3/index/microsoft-driver-block-list":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft's Vulnerable Drivers Blocklist\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-driver-block-list?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-driver-block-list_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-driver-block-list\"","tags":["indices"]}},"/v3/index/microsoft-kb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft KB list by CVE\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-kb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-kb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-kb\"","tags":["indices"]}},"/v3/index/mikrotik":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MikroTik Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mikrotik?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mikrotik_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mikrotik\"","tags":["indices"]}},"/v3/index/mindray":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mindray Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mindray?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mindray_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mindray\"","tags":["indices"]}},"/v3/index/misp-threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MISP Threat Actors\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/misp-threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_misp-threat-actors_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"misp-threat-actors\"","tags":["indices"]}},"/v3/index/mitel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitel\"","tags":["indices"]}},"/v3/index/mitre-attack-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE ATT\u0026CK Technique ID to CVE List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-attack-cve?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitre-attack-cve_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitre-attack-cve\"","tags":["indices"]}},"/v3/index/mitre-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitre-cvelist-v5_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitre-cvelist-v5\"","tags":["indices"]}},"/v3/index/mitsubishi-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitsubishi Electric Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitsubishi-electric?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitsubishi-electric_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitsubishi-electric\"","tags":["indices"]}},"/v3/index/mongodb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MongoDB Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mongodb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mongodb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mongodb\"","tags":["indices"]}},"/v3/index/moxa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moxa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/moxa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_moxa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"moxa\"","tags":["indices"]}},"/v3/index/mozilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mozilla Foundation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mozilla?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mozilla_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mozilla\"","tags":["indices"]}},"/v3/index/naver":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the naver index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Naver Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/naver?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_naver_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"naver\"","tags":["indices"]}},"/v3/index/ncsc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ncsc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ncsc\"","tags":["indices"]}},"/v3/index/ncsc-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc-cves?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ncsc-cves_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ncsc-cves\"","tags":["indices"]}},"/v3/index/nec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NEC Security Information Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nec\"","tags":["indices"]}},"/v3/index/nessus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nessus Plugins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nessus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nessus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nessus\"","tags":["indices"]}},"/v3/index/netapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NetApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netapp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netapp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netapp\"","tags":["indices"]}},"/v3/index/netatalk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netatalk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netatalk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netatalk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netatalk\"","tags":["indices"]}},"/v3/index/netgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netgate Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgate?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netgate_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netgate\"","tags":["indices"]}},"/v3/index/netgear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NETGEAR Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgear?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netgear_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netgear\"","tags":["indices"]}},"/v3/index/netskope":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netskope Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netskope?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netskope_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netskope\"","tags":["indices"]}},"/v3/index/nexpose":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nexpose Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nexpose?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nexpose_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nexpose\"","tags":["indices"]}},"/v3/index/nginx":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nginx Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nginx?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nginx_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nginx\"","tags":["indices"]}},"/v3/index/nhs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NHS Cyber Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nhs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nhs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nhs\"","tags":["indices"]}},"/v3/index/ni":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ni index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** National Instruments Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ni?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ni_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ni\"","tags":["indices"]}},"/v3/index/nist-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd\"","tags":["indices"]}},"/v3/index/nist-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd2_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd2\"","tags":["indices"]}},"/v3/index/nist-nvd2-cpematch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 CPE Match\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-cpematch?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd2-cpematch_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd2-cpematch\"","tags":["indices"]}},"/v3/index/nist-nvd2-sources":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 Source Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-sources?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd2-sources_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd2-sources\"","tags":["indices"]}},"/v3/index/node-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Node.js Security Working Group Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/node-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_node-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"node-security\"","tags":["indices"]}},"/v3/index/nodejs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NodeJS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nodejs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nodejs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nodejs\"","tags":["indices"]}},"/v3/index/nokia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nokia Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nokia?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nokia_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nokia\"","tags":["indices"]}},"/v3/index/notepadplusplus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Notepad++ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/notepadplusplus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_notepadplusplus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"notepadplusplus\"","tags":["indices"]}},"/v3/index/nozomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nozomi Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nozomi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nozomi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nozomi\"","tags":["indices"]}},"/v3/index/npm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the npm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NPM (JS/TS) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/npm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_npm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"npm\"","tags":["indices"]}},"/v3/index/ntp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NTP Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ntp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ntp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ntp\"","tags":["indices"]}},"/v3/index/nuclei":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuclei Templates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuclei?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nuclei_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nuclei\"","tags":["indices"]}},"/v3/index/nuget":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuget (C#/F#) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuget?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nuget_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nuget\"","tags":["indices"]}},"/v3/index/nvd-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVD's CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvd-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nvd-cpe-dictionary_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nvd-cpe-dictionary\"","tags":["indices"]}},"/v3/index/nvidia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVIDIA Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvidia?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nvidia_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nvidia\"","tags":["indices"]}},"/v3/index/nz-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT NZ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nz-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nz-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nz-advisories\"","tags":["indices"]}},"/v3/index/octopus-deploy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Octopus Deploy Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/octopus-deploy?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_octopus-deploy_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"octopus-deploy\"","tags":["indices"]}},"/v3/index/okta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the okta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Okta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/okta?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_okta_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"okta\"","tags":["indices"]}},"/v3/index/omron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron Vulnerability Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_omron_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"omron\"","tags":["indices"]}},"/v3/index/one-e":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 1E Published Product Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/one-e?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_one-e_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"one-e\"","tags":["indices"]}},"/v3/index/opam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** opam (OCaml) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opam?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_opam_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"opam\"","tags":["indices"]}},"/v3/index/open-cvdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Open Cloud Vulnerability \u0026 Security Issue Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/open-cvdb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_open-cvdb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"open-cvdb\"","tags":["indices"]}},"/v3/index/openbsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenBSD Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openbsd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openbsd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openbsd\"","tags":["indices"]}},"/v3/index/opengear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Opengear Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opengear?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_opengear_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"opengear\"","tags":["indices"]}},"/v3/index/openjdk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenJDK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openjdk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openjdk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openjdk\"","tags":["indices"]}},"/v3/index/openssh":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSH Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssh?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openssh_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openssh\"","tags":["indices"]}},"/v3/index/openssl-secadv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSL Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssl-secadv?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openssl-secadv_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openssl-secadv\"","tags":["indices"]}},"/v3/index/openstack":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenStack Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openstack?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openstack_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openstack\"","tags":["indices"]}},"/v3/index/openwrt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenWrt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openwrt?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openwrt_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openwrt\"","tags":["indices"]}},"/v3/index/oracle":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_oracle_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"oracle\"","tags":["indices"]}},"/v3/index/oracle-cpu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Update Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_oracle-cpu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"oracle-cpu\"","tags":["indices"]}},"/v3/index/oracle-cpu-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Updates CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_oracle-cpu-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"oracle-cpu-csaf\"","tags":["indices"]}},"/v3/index/osv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the osv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Open Source Vulnerabilities Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/osv?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_osv_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"osv\"","tags":["indices"]}},"/v3/index/otrs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OTRS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/otrs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_otrs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"otrs\"","tags":["indices"]}},"/v3/index/owncloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OwnCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/owncloud?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_owncloud_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"owncloud\"","tags":["indices"]}},"/v3/index/packetstorm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PacketStorm\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/packetstorm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_packetstorm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"packetstorm\"","tags":["indices"]}},"/v3/index/palantir":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palantir Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palantir?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_palantir_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"palantir\"","tags":["indices"]}},"/v3/index/palo-alto":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palo Alto Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palo-alto?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_palo-alto_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"palo-alto\"","tags":["indices"]}},"/v3/index/panasonic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Panasonic Vulnerability Advisory List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/panasonic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_panasonic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"panasonic\"","tags":["indices"]}},"/v3/index/papercut":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PaperCut Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/papercut?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_papercut_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"papercut\"","tags":["indices"]}},"/v3/index/pega":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pega index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pega Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pega?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pega_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pega\"","tags":["indices"]}},"/v3/index/philips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the philips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Philips Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/philips?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_philips_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"philips\"","tags":["indices"]}},"/v3/index/phoenix-contact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Phoenix Contact Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/phoenix-contact?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_phoenix-contact_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"phoenix-contact\"","tags":["indices"]}},"/v3/index/php-my-admin":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** phpMyAdmin Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/php-my-admin?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_php-my-admin_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"php-my-admin\"","tags":["indices"]}},"/v3/index/pkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PK CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pkcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pkcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pkcert\"","tags":["indices"]}},"/v3/index/postgressql":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PostgresSQL Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/postgressql?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_postgressql_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"postgressql\"","tags":["indices"]}},"/v3/index/powerdns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PowerDNS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/powerdns?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_powerdns_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"powerdns\"","tags":["indices"]}},"/v3/index/progress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the progress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Progress Product Alert Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/progress?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_progress_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"progress\"","tags":["indices"]}},"/v3/index/proofpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Proofpoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/proofpoint?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_proofpoint_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"proofpoint\"","tags":["indices"]}},"/v3/index/ptc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PTC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ptc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ptc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ptc\"","tags":["indices"]}},"/v3/index/pub":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pub index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pub (Dart/Flutter) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pub?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pub_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pub\"","tags":["indices"]}},"/v3/index/pure-storage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pure Storage Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pure-storage?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pure-storage_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pure-storage\"","tags":["indices"]}},"/v3/index/pypa-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypa-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pypa-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pypa-advisories\"","tags":["indices"]}},"/v3/index/pypi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPi (Python) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pypi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pypi\"","tags":["indices"]}},"/v3/index/qnap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** QNAP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qnap?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qnap_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qnap\"","tags":["indices"]}},"/v3/index/qqids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QIDs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qqids?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qqids_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qqids\"","tags":["indices"]}},"/v3/index/qualcomm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualcomm Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualcomm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qualcomm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qualcomm\"","tags":["indices"]}},"/v3/index/qualys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qualys_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qualys\"","tags":["indices"]}},"/v3/index/qualys-qids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QID\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys-qids?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qualys-qids_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qualys-qids\"","tags":["indices"]}},"/v3/index/qubes-qsb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qubes Security Bulletin\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qubes-qsb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qubes-qsb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qubes-qsb\"","tags":["indices"]}},"/v3/index/ransomware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Ransomware\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ransomware?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ransomware_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ransomware\"","tags":["indices"]}},"/v3/index/red-lion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red-Lion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/red-lion?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_red-lion_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"red-lion\"","tags":["indices"]}},"/v3/index/redhat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red Hat Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_redhat_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"redhat\"","tags":["indices"]}},"/v3/index/redhat-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSAF data for redhat\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat-cves?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_redhat-cves_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"redhat-cves\"","tags":["indices"]}},"/v3/index/renesas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Renesas Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/renesas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_renesas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"renesas\"","tags":["indices"]}},"/v3/index/revive":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the revive index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Revive Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/revive?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_revive_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"revive\"","tags":["indices"]}},"/v3/index/roche":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the roche index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Roche Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/roche?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_roche_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"roche\"","tags":["indices"]}},"/v3/index/rockwell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rockwell Automation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rockwell?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rockwell_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rockwell\"","tags":["indices"]}},"/v3/index/rocky":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rocky_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rocky\"","tags":["indices"]}},"/v3/index/rocky-errata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Errata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-errata?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rocky-errata_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rocky-errata\"","tags":["indices"]}},"/v3/index/rocky-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rocky-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rocky-purls\"","tags":["indices"]}},"/v3/index/rsync":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rsync Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rsync?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rsync_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rsync\"","tags":["indices"]}},"/v3/index/ruckus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruckus Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ruckus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ruckus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ruckus\"","tags":["indices"]}},"/v3/index/rustsec-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** RustSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rustsec-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rustsec-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rustsec-advisories\"","tags":["indices"]}},"/v3/index/sacert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Saudi CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sacert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sacert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sacert\"","tags":["indices"]}},"/v3/index/safran":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the safran index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Safran Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/safran?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_safran_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"safran\"","tags":["indices"]}},"/v3/index/saint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the saint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAINT Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/saint?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_saint_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"saint\"","tags":["indices"]}},"/v3/index/salesforce":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SalesForce Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/salesforce?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_salesforce_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"salesforce\"","tags":["indices"]}},"/v3/index/samba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the samba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Samba Security Releases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/samba?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_samba_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"samba\"","tags":["indices"]}},"/v3/index/sandisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sandisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sandisk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sandisk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sandisk\"","tags":["indices"]}},"/v3/index/sans-dshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SANS DShield Honeypot Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sans-dshield?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sans-dshield_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sans-dshield\"","tags":["indices"]}},"/v3/index/sap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAP Security Patch Days\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sap?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sap_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sap\"","tags":["indices"]}},"/v3/index/schneider-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schneider Electric Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schneider-electric?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_schneider-electric_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"schneider-electric\"","tags":["indices"]}},"/v3/index/schutzwerk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schutzwerk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schutzwerk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_schutzwerk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"schutzwerk\"","tags":["indices"]}},"/v3/index/sec-consult":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SEC Consult Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sec-consult?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sec-consult_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sec-consult\"","tags":["indices"]}},"/v3/index/securitylab":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Lab Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/securitylab?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_securitylab_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"securitylab\"","tags":["indices"]}},"/v3/index/seebug":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Seebug Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/seebug?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_seebug_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"seebug\"","tags":["indices"]}},"/v3/index/sel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schweitzer Engineering Laboratories Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sel\"","tags":["indices"]}},"/v3/index/sentinelone":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SentinelOne Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sentinelone?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sentinelone_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sentinelone\"","tags":["indices"]}},"/v3/index/servicenow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ServiceNow CVE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/servicenow?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_servicenow_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"servicenow\"","tags":["indices"]}},"/v3/index/shadowserver-exploited":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shadowserver Foundation Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shadowserver-exploited?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_shadowserver-exploited_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"shadowserver-exploited\"","tags":["indices"]}},"/v3/index/shielder":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shielder Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shielder?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_shielder_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"shielder\"","tags":["indices"]}},"/v3/index/sick":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sick index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SICK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sick?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sick_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sick\"","tags":["indices"]}},"/v3/index/siemens":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Siemens Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/siemens?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_siemens_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"siemens\"","tags":["indices"]}},"/v3/index/sierra-wireless":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sierra Wireless Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sierra-wireless?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sierra-wireless_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sierra-wireless\"","tags":["indices"]}},"/v3/index/sigmahq-sigma-rules":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sigma Rules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sigmahq-sigma-rules?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sigmahq-sigma-rules_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sigmahq-sigma-rules\"","tags":["indices"]}},"/v3/index/singcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSA Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/singcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_singcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"singcert\"","tags":["indices"]}},"/v3/index/sitecore":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sitecore Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sitecore?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sitecore_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sitecore\"","tags":["indices"]}},"/v3/index/slackware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Slackware Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/slackware?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_slackware_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"slackware\"","tags":["indices"]}},"/v3/index/solarwinds":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SolarWinds Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solarwinds?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_solarwinds_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"solarwinds\"","tags":["indices"]}},"/v3/index/solr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Solr CVE Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solr?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_solr_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"solr\"","tags":["indices"]}},"/v3/index/sonatype":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sonatype Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonatype?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sonatype_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sonatype\"","tags":["indices"]}},"/v3/index/sonicwall":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SonicWall Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonicwall?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sonicwall_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sonicwall\"","tags":["indices"]}},"/v3/index/spacelabs-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spacelabs Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spacelabs-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_spacelabs-healthcare_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"spacelabs-healthcare\"","tags":["indices"]}},"/v3/index/splunk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Splunk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/splunk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_splunk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"splunk\"","tags":["indices"]}},"/v3/index/spring":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spring index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spring Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spring?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_spring_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"spring\"","tags":["indices"]}},"/v3/index/ssd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SSD Secure Disclosure Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ssd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ssd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ssd\"","tags":["indices"]}},"/v3/index/stormshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stormshield Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stormshield?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_stormshield_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"stormshield\"","tags":["indices"]}},"/v3/index/stryker":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stryker Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stryker?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_stryker_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"stryker\"","tags":["indices"]}},"/v3/index/sudo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sudo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sudo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sudo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sudo\"","tags":["indices"]}},"/v3/index/suse":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SUSE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_suse_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"suse\"","tags":["indices"]}},"/v3/index/suse-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Suse Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_suse-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"suse-security\"","tags":["indices"]}},"/v3/index/swift":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swift index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swift packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swift?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_swift_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"swift\"","tags":["indices"]}},"/v3/index/swisslog-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swisslog Healthcare CVE Disclosures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swisslog-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_swisslog-healthcare_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"swisslog-healthcare\"","tags":["indices"]}},"/v3/index/symfony":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Symfony Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/symfony?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_symfony_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"symfony\"","tags":["indices"]}},"/v3/index/synacktiv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synacktiv Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synacktiv?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_synacktiv_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"synacktiv\"","tags":["indices"]}},"/v3/index/syncrosoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SyncroSoft Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syncrosoft?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_syncrosoft_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"syncrosoft\"","tags":["indices"]}},"/v3/index/synology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synology?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_synology_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"synology\"","tags":["indices"]}},"/v3/index/syss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Syss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_syss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"syss\"","tags":["indices"]}},"/v3/index/tailscale":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tailscale Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tailscale?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tailscale_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tailscale\"","tags":["indices"]}},"/v3/index/teamviewer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TeamViewer Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/teamviewer?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_teamviewer_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"teamviewer\"","tags":["indices"]}},"/v3/index/tenable-research-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tenable Research Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tenable-research-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tenable-research-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tenable-research-advisories\"","tags":["indices"]}},"/v3/index/tencent":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tencent Vulnerability Risk Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tencent?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tencent_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tencent\"","tags":["indices"]}},"/v3/index/thales":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thales index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thales Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thales?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_thales_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"thales\"","tags":["indices"]}},"/v3/index/themissinglink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** the missing link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/themissinglink?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_themissinglink_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"themissinglink\"","tags":["indices"]}},"/v3/index/thermo-fisher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thermo Fisher Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thermo-fisher?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_thermo-fisher_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"thermo-fisher\"","tags":["indices"]}},"/v3/index/threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Threat Actors Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_threat-actors_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"threat-actors\"","tags":["indices"]}},"/v3/index/ti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Texas Instruments Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ti?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ti_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ti\"","tags":["indices"]}},"/v3/index/tibco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TIBCO Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tibco?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tibco_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tibco\"","tags":["indices"]}},"/v3/index/tp-link":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TP-Link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tp-link?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tp-link_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tp-link\"","tags":["indices"]}},"/v3/index/trane-technology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trane Technology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trane-technology?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_trane-technology_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"trane-technology\"","tags":["indices"]}},"/v3/index/trendmicro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trend Micro Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trendmicro?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_trendmicro_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"trendmicro\"","tags":["indices"]}},"/v3/index/trustwave":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trustwave Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trustwave?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_trustwave_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"trustwave\"","tags":["indices"]}},"/v3/index/twcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Taiwan CERT Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/twcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_twcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"twcert\"","tags":["indices"]}},"/v3/index/ubiquiti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubiquiti Security Advisory Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubiquiti?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ubiquiti_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ubiquiti\"","tags":["indices"]}},"/v3/index/ubuntu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ubuntu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ubuntu\"","tags":["indices"]}},"/v3/index/ubuntu-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ubuntu-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ubuntu-purls\"","tags":["indices"]}},"/v3/index/unify":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unify index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unify Product Security Advisories and Security Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unify?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_unify_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"unify\"","tags":["indices"]}},"/v3/index/unisoc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** UNISOC Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unisoc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_unisoc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"unisoc\"","tags":["indices"]}},"/v3/index/usd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** usd Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_usd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"usd\"","tags":["indices"]}},"/v3/index/usom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** USOM Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usom?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_usom_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"usom\"","tags":["indices"]}},"/v3/index/vandyke":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VanDyke Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vandyke?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vandyke_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vandyke\"","tags":["indices"]}},"/v3/index/vapidlabs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VapidLabs Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vapidlabs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vapidlabs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vapidlabs\"","tags":["indices"]}},"/v3/index/vc-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vc-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vc-cpe-dictionary_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vc-cpe-dictionary\"","tags":["indices"]}},"/v3/index/vde":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vde index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VDE CERT Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vde?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vde_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vde\"","tags":["indices"]}},"/v3/index/veeam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veeam Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veeam?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_veeam_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"veeam\"","tags":["indices"]}},"/v3/index/veritas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veritas Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veritas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_veritas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"veritas\"","tags":["indices"]}},"/v3/index/virtuozzo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Virtuozzo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/virtuozzo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_virtuozzo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"virtuozzo\"","tags":["indices"]}},"/v3/index/vlc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VLC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vlc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vlc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vlc\"","tags":["indices"]}},"/v3/index/vmware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VMWare Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vmware?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vmware_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vmware\"","tags":["indices"]}},"/v3/index/voidsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VoidSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/voidsec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_voidsec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"voidsec\"","tags":["indices"]}},"/v3/index/vulncheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck\"","tags":["indices"]}},"/v3/index/vulncheck-canaries":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (10 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-10d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-10d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-10d\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (30 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-30d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-30d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-30d\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (3 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-3d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-3d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-3d\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (90 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-90d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-90d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-90d\"","tags":["indices"]}},"/v3/index/vulncheck-config":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Configurations\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-config?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-config_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-config\"","tags":["indices"]}},"/v3/index/vulncheck-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-cvelist-v5_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-cvelist-v5\"","tags":["indices"]}},"/v3/index/vulncheck-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck KEV\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-kev?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-kev_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-kev\"","tags":["indices"]}},"/v3/index/vulncheck-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-nvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd\"","tags":["indices"]}},"/v3/index/vulncheck-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD V2\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-nvd2_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd2\"","tags":["indices"]}},"/v3/index/vulnerability-aliases":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vulnerability Aliases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnerability-aliases?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulnerability-aliases_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulnerability-aliases\"","tags":["indices"]}},"/v3/index/vulnrichment":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Vulnrichment\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnrichment?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulnrichment_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulnrichment\"","tags":["indices"]}},"/v3/index/vyaire":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vyaire Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vyaire?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vyaire_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vyaire\"","tags":["indices"]}},"/v3/index/watchguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Watchguard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/watchguard?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_watchguard_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"watchguard\"","tags":["indices"]}},"/v3/index/whatsapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WhatsApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/whatsapp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_whatsapp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"whatsapp\"","tags":["indices"]}},"/v3/index/wibu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wibu Systems Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wibu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wibu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wibu\"","tags":["indices"]}},"/v3/index/wireshark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wireshark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wireshark?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wireshark_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wireshark\"","tags":["indices"]}},"/v3/index/with-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** With Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/with-secure?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_with-secure_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"with-secure\"","tags":["indices"]}},"/v3/index/wolfi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wolfi Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wolfi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wolfi\"","tags":["indices"]}},"/v3/index/wolfssl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WolfSSL Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfssl?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wolfssl_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wolfssl\"","tags":["indices"]}},"/v3/index/wordfence":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wordfence Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wordfence?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wordfence_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wordfence\"","tags":["indices"]}},"/v3/index/xen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xen Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xen?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xen_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xen\"","tags":["indices"]}},"/v3/index/xerox":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xerox Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xerox?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xerox_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xerox\"","tags":["indices"]}},"/v3/index/xiaomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xiaomi Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xiaomi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xiaomi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xiaomi\"","tags":["indices"]}},"/v3/index/xylem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xylem Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xylem?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xylem_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xylem\"","tags":["indices"]}},"/v3/index/yamaha":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yamaha Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yamaha?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_yamaha_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"yamaha\"","tags":["indices"]}},"/v3/index/yokogawa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yokogawa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yokogawa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_yokogawa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"yokogawa\"","tags":["indices"]}},"/v3/index/yubico":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yubico Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yubico?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_yubico_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"yubico\"","tags":["indices"]}},"/v3/index/zdi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zero Day Initiative Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zdi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zdi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zdi\"","tags":["indices"]}},"/v3/index/zebra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zebra_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zebra\"","tags":["indices"]}},"/v3/index/zeroscience":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zeroscience index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZeroScience Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zeroscience?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zeroscience?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zeroscience_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zeroscience\"","tags":["indices"]}},"/v3/index/zimbra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zimbra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zimbra Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zimbra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zimbra?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zimbra_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zimbra\"","tags":["indices"]}},"/v3/index/zoom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zoom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zoom Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zoom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zoom?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zoom_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zoom\"","tags":["indices"]}},"/v3/index/zscaler":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zscaler index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zscaler Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zscaler?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zscaler?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zscaler_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zscaler\"","tags":["indices"]}},"/v3/index/zuso":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zuso index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZUSO Vulnerability Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zuso?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zuso?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zuso_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zuso\"","tags":["indices"]}},"/v3/index/zyxel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zyxel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zyxel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zyxel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zyxel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zyxel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zyxel\"","tags":["indices"]}},"/v3/openapi":{"get":{"description":"Return the VulnCheck API (v3) OpenAPI specification","operationId":"openapi_get","responses":{"200":{"content":{"application/json":{"schema":{"additionalProperties":{},"type":"object"}}},"description":"OK"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return OpenAPI specification","tags":["endpoints"]}},"/v3/pdns/vulncheck-c2":{"get":{"description":"Retrieve a list of hostnames, identified as running Command \u0026 Control infrastructure.","operationId":"pdns_vulncheck-c2_get","parameters":[{"description":"Format of the Hostnames in the response (Defaults To: text)","in":"query","name":"format","schema":{"enum":["txt","json","text"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve a list of C2 Hostnames","tags":["endpoints"]}},"/v3/purl":{"get":{"description":"Based on the specified PURL, this endpoint will return a list of vulnerabilities that are related to the package. We currently support hex, golang, hackage, npm, and pypi","operationId":"purl_get","parameters":[{"description":"URL string used to identify and locate a software package","in":"query","name":"purl","required":true,"schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Request vulnerabilities related to a PURL","tags":["endpoints"]}},"/v3/purls":{"post":{"description":"Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities","operationId":"purls_post","requestBody":{"content":{"application/json":{"schema":{"items":{"type":"string"},"title":"purls","type":"array"}}},"description":"PURL strings used to identify and locate software packages","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Request vulnerabilities related to a list of PURLs","tags":["endpoints"]}},"/v3/rules/initial-access/{type}":{"get":{"description":"Retrieve set of initial-access detection rules by type","operationId":"rules_initial-access_type_get","parameters":[{"description":"Type of ruleset to retrieve","in":"path","name":"type","required":true,"schema":{"enum":["snort","suricata"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve set of initial-access detection rules","tags":["endpoints"]}},"/v3/tags/vulncheck-c2":{"get":{"description":"Retrieve a list of IP addresses, identified as running Command \u0026 Control infrastructure","operationId":"tags_vulncheck-c2_get","parameters":[{"description":"Format of the IP Addresses in the response (Defaults To: text)","in":"query","name":"format","schema":{"enum":["txt","json","text"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve a list of C2 IP addresses","tags":["endpoints"]}},"/v4/advisory":{"get":{"description":"Query the VulnCheck v4 advisory index","operationId":"v4QueryAdvisories","parameters":[{"description":"Filter by advisory feed name (e.g. 'vulncheck')","in":"query","name":"name","schema":{"type":"string"}},{"description":"Filter by CVE ID (e.g. 'CVE-2024-1234')","in":"query","name":"cve_id","schema":{"type":"string"}},{"description":"Filter by vendor name","in":"query","name":"vendor","schema":{"type":"string"}},{"description":"Filter by product name","in":"query","name":"product","schema":{"type":"string"}},{"description":"Filter by OS/platform","in":"query","name":"platform","schema":{"type":"string"}},{"description":"Filter by product version (semver-aware)","in":"query","name":"version","schema":{"type":"string"}},{"description":"Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*')","in":"query","name":"cpe","schema":{"type":"string"}},{"description":"Filter by package name","in":"query","name":"package_name","schema":{"type":"string"}},{"description":"Filter by package URL (PURL)","in":"query","name":"purl","schema":{"type":"string"}},{"description":"Filter by reference URL","in":"query","name":"reference_url","schema":{"type":"string"}},{"description":"Filter by reference tag (e.g. 'patch', 'advisory')","in":"query","name":"reference_tag","schema":{"type":"string"}},{"description":"Filter by description language (e.g. 'en')","in":"query","name":"description_lang","schema":{"type":"string"}},{"description":"Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d')","in":"query","name":"updatedAfter","schema":{"type":"string"}},{"description":"Return advisories updated before this date (RFC3339 or date-math)","in":"query","name":"updatedBefore","schema":{"type":"string"}},{"description":"Page number (default: 1)","in":"query","name":"page","schema":{"type":"integer"}},{"description":"Results per page, max 100 (default: 10)","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"Presence activates cursor mode from the first page (value is ignored; cannot be combined with page)","in":"query","name":"start_cursor","schema":{"type":"string"}},{"description":"Cursor from previous response _meta.next_cursor to fetch the next page","in":"query","name":"cursor","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.V4AdvisoryReturnValue"}}},"description":"OK"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Bad Request"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Unauthorized"},"402":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Payment Required"},"503":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Query advisories","tags":["advisory"]}},"/v4/advisory/list":{"get":{"description":"Return a list of available advisory feed names","operationId":"v4ListAdvisoryFeeds","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.V4ListFeedReturnValue"}}},"description":"OK"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Bad Request"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Unauthorized"},"402":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Payment Required"},"503":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"List advisory feeds","tags":["advisory"]}},"/v4/backup":{"get":{"description":"Returns the list of advisory feeds for which a backup can be requested","operationId":"v4ListBackups","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/backup.ListBackupsResponse"}}},"description":"OK"},"401":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Unauthorized"},"503":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"List available backups","tags":["backup"]}},"/v4/backup/{index}":{"get":{"description":"Validates the feed, generates a fresh backup zip if the source parquet is newer, and returns a pre-signed download URL","operationId":"v4GetBackupByName","parameters":[{"description":"Feed name (e.g. 'vulncheck')","in":"path","name":"index","required":true,"schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/backup.BackupResponse"}}},"description":"OK"},"401":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Unauthorized"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"503":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Get backup by feed name","tags":["backup"]}}},"servers":[{"url":"https://api.vulncheck.com"}]} \ No newline at end of file +{"components":{"schemas":{"advisory.A10":{"description":"advisory.A10","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"reference":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ABBAdvisory":{"description":"advisory.ABBAdvisory","properties":{"abb_vulnerability_id":{"items":{"type":"string"},"type":"array","uniqueItems":false},"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"document_id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ADP":{"description":"advisory.ADP","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"metrics":{"items":{"$ref":"#/components/schemas/advisory.VulnrichmentMetric"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"}},"type":"object"},"advisory.ADPContainer":{"description":"advisory.ADPContainer","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"datePublic":{"description":"OK","type":"string"},"descriptions":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false},"impacts":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.Impact"},"type":"array","uniqueItems":false},"metrics":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.Metric"},"type":"array","uniqueItems":false},"problemTypes":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.MProblemTypes"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/components/schemas/advisory.MReference"},"type":"array","uniqueItems":false},"tags":{"description":"OK","items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"description":"OK","type":"string"}},"type":"object"},"advisory.AIX":{"description":"advisory.AIX","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMD":{"description":"advisory.AMD","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMI":{"description":"advisory.AMI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ASRG":{"description":"advisory.ASRG","properties":{"affected_products":{"type":"string"},"capec":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"problem_type":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVEVAAdvisory":{"description":"advisory.AVEVAAdvisory","properties":{"aveva_vulnerability_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"published_by":{"type":"string"},"rating":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVIDMLAdvs":{"description":"advisory.AVIDMLAdvs","properties":{"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AWS":{"description":"advisory.AWS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Abbott":{"description":"advisory.Abbott","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Absolute":{"description":"advisory.Absolute","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Acknowledgement":{"description":"advisory.Acknowledgement","properties":{"name":{"items":{"$ref":"#/components/schemas/advisory.IVal"},"type":"array","uniqueItems":false},"url":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Acronis":{"description":"advisory.Acronis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdobeAdvisory":{"description":"advisory.AdobeAdvisory","properties":{"adobe_cves":{"items":{"$ref":"#/components/schemas/advisory.AdobeCVE"},"type":"array","uniqueItems":false},"affected":{"items":{"$ref":"#/components/schemas/advisory.AdobeAffected"},"type":"array"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"solutions":{"items":{"$ref":"#/components/schemas/advisory.AdobeSolution"},"type":"array"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AdobeAffected":{"description":"advisory.AdobeAffected","properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AdobeCVE":{"description":"advisory.AdobeCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.AdobeSolution":{"description":"advisory.AdobeSolution","properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Advantech":{"description":"advisory.Advantech","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Advisory":{"description":"advisory.Advisory","properties":{"affects":{"type":"string"},"announced":{"type":"string"},"category":{"type":"string"},"corrections":{"items":{"$ref":"#/components/schemas/advisory.Correction"},"type":"array"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"module":{"type":"string"},"name":{"type":"string"},"topic":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdvisoryDetails":{"description":"advisory.AdvisoryDetails","properties":{"bugzilla":{"$ref":"#/components/schemas/advisory.Bugzilla"},"cve":{"$ref":"#/components/schemas/advisory.OvalCVE"},"issued":{"$ref":"#/components/schemas/advisory.Issued"},"severity":{"type":"string"},"updated":{"$ref":"#/components/schemas/advisory.Updated"}},"type":"object"},"advisory.AdvisoryRecord":{"description":"advisory.AdvisoryRecord","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"external_id":{"items":{"type":"string"},"type":"array","uniqueItems":false},"lang":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.Affected":{"description":"advisory.Affected","properties":{"database_specific":{"description":"The meaning of the values within the object is entirely defined by the database"},"ecosystem_specific":{"description":"The meaning of the values within the object is entirely defined by the ecosystem"},"package":{"$ref":"#/components/schemas/advisory.OSVPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.Range"},"type":"array","uniqueItems":false},"severity":{"items":{"$ref":"#/components/schemas/advisory.Severity"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AffectedChrome":{"description":"advisory.AffectedChrome","properties":{"fixed_version":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.AffectedDebianPackage":{"description":"advisory.AffectedDebianPackage","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRelease":{"description":"advisory.AffectedDebianRelease","properties":{"fixed_version":{"type":"string"},"nodsa":{"type":"string"},"nodsa_reason":{"type":"string"},"release_name":{"type":"string"},"repositories":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianRepository"},"type":"array","uniqueItems":false},"status":{"type":"string"},"urgency":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRepository":{"description":"advisory.AffectedDebianRepository","properties":{"repository_name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedFile":{"description":"advisory.AffectedFile","properties":{"file_last_modified":{"type":"string"},"file_name":{"type":"string"}},"type":"object"},"advisory.AffectedProduct":{"description":"advisory.AffectedProduct","properties":{"affectedReleases":{"type":"string"},"fixedReleases":{"type":"string"},"lexmarkModels":{"type":"string"}},"type":"object"},"advisory.AffectedRel":{"description":"advisory.AffectedRel","properties":{"advisory":{"type":"string"},"cpe":{"type":"string"},"package":{"type":"string"},"product_name":{"type":"string"},"release_date":{"type":"string"}},"type":"object"},"advisory.AffectedUbuntuPackage":{"description":"advisory.AffectedUbuntuPackage","properties":{"break_commit_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fix_commit_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package_name":{"type":"string"},"package_release_status":{"items":{"$ref":"#/components/schemas/advisory.UbuntuPackageReleaseStatus"},"type":"array","uniqueItems":false},"upstream_fix_url":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AlephResearch":{"description":"advisory.AlephResearch","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Alibaba":{"description":"advisory.Alibaba","properties":{"cnnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation_cn":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AlmaDate":{"description":"advisory.AlmaDate","properties":{"$date":{"type":"integer"}},"type":"object"},"advisory.AlmaLinuxUpdate":{"description":"advisory.AlmaLinuxUpdate","properties":{"bs_repo_id":{"$ref":"#/components/schemas/advisory.AlmaObjectID"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fromstr":{"type":"string"},"id":{"$ref":"#/components/schemas/advisory.AlmaObjectID"},"issued_date":{"$ref":"#/components/schemas/advisory.AlmaDate"},"pkglist":{"$ref":"#/components/schemas/advisory.AlmaPackageList"},"pushcount":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.AlmaReference"},"type":"array","uniqueItems":false},"release":{"type":"string"},"rights":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"update_url":{"type":"string"},"updated_date":{"$ref":"#/components/schemas/advisory.AlmaDate"},"updateinfo_id":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaObjectID":{"description":"advisory.AlmaObjectID","properties":{"$oid":{"type":"string"}},"type":"object"},"advisory.AlmaPackage":{"description":"advisory.AlmaPackage","properties":{"arch":{"type":"string"},"epoch":{"type":"string"},"filename":{"type":"string"},"name":{"type":"string"},"reboot_suggested":{"type":"integer"},"release":{"type":"string"},"source":{"type":"string"},"sum":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaPackageList":{"description":"advisory.AlmaPackageList","properties":{"name":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.AlmaPackage"},"type":"array","uniqueItems":false},"shortname":{"type":"string"}},"type":"object"},"advisory.AlmaReference":{"description":"advisory.AlmaReference","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDB":{"description":"advisory.AlpineLinuxSecDB","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"distroversion":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecDBPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDBPackage":{"description":"advisory.AlpineLinuxSecDBPackage","properties":{"package_name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecurityFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AlpineLinuxSecurityFix":{"description":"advisory.AlpineLinuxSecurityFix","properties":{"cve":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"advisory.AmazonAffectedPackage":{"description":"advisory.AmazonAffectedPackage","properties":{"advisory":{"type":"string"},"package":{"type":"string"},"platform":{"type":"string"},"releaseDate":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.AmazonCVE":{"description":"advisory.AmazonCVE","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AmazonAffectedPackage"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AnchoreNVDOverride":{"description":"advisory.AnchoreNVDOverride","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"override":{"$ref":"#/components/schemas/advisory.Override"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAdvisory":{"description":"advisory.AndroidAdvisory","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AndroidAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.AndroidReference"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAffected":{"description":"advisory.AndroidAffected","properties":{"ecosystem_specific":{"$ref":"#/components/schemas/advisory.EcoSystem"},"package":{"$ref":"#/components/schemas/advisory.AndroidPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.AndroidRange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AndroidEvent":{"description":"advisory.AndroidEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.AndroidPackage":{"description":"advisory.AndroidPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.AndroidRange":{"description":"advisory.AndroidRange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.AndroidEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.AndroidReference":{"description":"advisory.AndroidReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheActiveMQ":{"description":"advisory.ApacheActiveMQ","properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArchiva":{"description":"advisory.ApacheArchiva","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArrow":{"description":"advisory.ApacheArrow","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCamel":{"description":"advisory.ApacheCamel","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCommons":{"description":"advisory.ApacheCommons","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCouchDB":{"description":"advisory.ApacheCouchDB","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheFlink":{"description":"advisory.ApacheFlink","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.ApacheGuacamole":{"description":"advisory.ApacheGuacamole","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHTTP":{"description":"advisory.ApacheHTTP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHadoop":{"description":"advisory.ApacheHadoop","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheJSPWiki":{"description":"advisory.ApacheJSPWiki","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheKafka":{"description":"advisory.ApacheKafka","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheLoggingServices":{"description":"advisory.ApacheLoggingServices","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheNiFi":{"description":"advisory.ApacheNiFi","properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOFBiz":{"description":"advisory.ApacheOFBiz","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenMeetings":{"description":"advisory.ApacheOpenMeetings","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenOffice":{"description":"advisory.ApacheOpenOffice","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApachePulsar":{"description":"advisory.ApachePulsar","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheShiro":{"description":"advisory.ApacheShiro","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSpark":{"description":"advisory.ApacheSpark","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheStruts":{"description":"advisory.ApacheStruts","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"rating":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_version":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ApacheSubversion":{"description":"advisory.ApacheSubversion","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSuperset":{"description":"advisory.ApacheSuperset","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheTomcat":{"description":"advisory.ApacheTomcat","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheZooKeeper":{"description":"advisory.ApacheZooKeeper","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppCheck":{"description":"advisory.AppCheck","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Appgate":{"description":"advisory.Appgate","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleAdvisory":{"description":"advisory.AppleAdvisory","properties":{"components":{"items":{"$ref":"#/components/schemas/advisory.AppleComponent"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleComponent":{"description":"advisory.AppleComponent","properties":{"available_for":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"impact":{"type":"string"},"itw_exploit":{"type":"boolean"},"name":{"type":"string"}},"type":"object"},"advisory.ArchIssue":{"description":"advisory.ArchIssue","properties":{"advisories":{"items":{"type":"string"},"type":"array"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"issues":{"description":"cves","items":{"type":"string"},"type":"array"},"name":{"type":"string"},"packages":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"ticket":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Arista":{"description":"advisory.Arista","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Aruba":{"description":"advisory.Aruba","properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AssetNote":{"description":"advisory.AssetNote","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asterisk":{"description":"advisory.Asterisk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Astra":{"description":"advisory.Astra","properties":{"bdu":{"items":{"type":"string"},"type":"array","uniqueItems":false},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_ru":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asus":{"description":"advisory.Asus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianAdvisory":{"description":"advisory.AtlassianAdvisory","properties":{"affected_version":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"detailed_summary":{"description":"overloading in places with 'RiskAssessment' and other places with\n'Description'","type":"string"},"fixed_version":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"release_date":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianProducts":{"description":"advisory.AtlassianProducts","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"}},"type":"object"},"advisory.AtlassianVuln":{"description":"advisory.AtlassianVuln","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"$ref":"#/components/schemas/advisory.AtlassianProducts"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Atredis":{"description":"advisory.Atredis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendors":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Audiocodes":{"description":"advisory.Audiocodes","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AusCert":{"description":"advisory.AusCert","properties":{"body":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"link":{"type":"string"},"operatingSystem":{"type":"string"},"product":{"type":"string"},"publisher":{"type":"string"},"resolution":{"type":"string"}},"type":"object"},"advisory.Autodesk":{"description":"advisory.Autodesk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avaya":{"description":"advisory.Avaya","properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"last_revised":{"type":"string"},"overview":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avigilon":{"description":"advisory.Avigilon","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Award":{"description":"advisory.Award","properties":{"amount":{"type":"string"},"currency":{"type":"string"}},"type":"object"},"advisory.Axis":{"description":"advisory.Axis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Azul":{"description":"advisory.Azul","properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"prime_version":{"items":{"$ref":"#/components/schemas/advisory.PrimeVersion"},"type":"array","uniqueItems":false},"release":{"type":"string"},"url":{"type":"string"},"zulu_version":{"items":{"$ref":"#/components/schemas/advisory.ZuluVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BBraunAdvisory":{"description":"advisory.BBraunAdvisory","properties":{"attention":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"equipment":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerabilities":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BDUAdvisory":{"description":"advisory.BDUAdvisory","properties":{"bdu_id":{"description":"BDU:2022-03833","type":"string"},"cve":{"description":"[]string{\"CVE-2022-28194\"}","items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"$ref":"#/components/schemas/advisory.BDUCvss"},"cvss3":{"$ref":"#/components/schemas/advisory.BDUCvss3"},"cwe":{"description":"CWE-119","type":"string"},"date_added":{"type":"string"},"description_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"environment":{"$ref":"#/components/schemas/advisory.BDUEnvironment"},"exploit_status_en":{"description":"Exploited","type":"string"},"exploit_status_ru":{"description":"Exploited","type":"string"},"fix_status_en":{"description":"Fixed","type":"string"},"fix_status_ru":{"description":"Fixed","type":"string"},"identify_date":{"description":"2022-09-01","type":"string"},"name_ru":{"description":"BDU:2022-03833: Уязвимость модуля Cboot (tegrabl_cbo.c) пакета драйверов микропрограммного обеспечения вычислительных плат NVIDIA Jetson, позволяющая нарушителю выполнить произвольный код или вызвать частичный отказ в обслуживании","type":"string"},"severity_ru":{"description":"High","type":"string"},"solution_ru":{"description":"Обновите драйверы микропрограммного обеспечения вычислительных плат NVIDIA Jetson до версии 32.6.1 или более поздней","type":"string"},"sources":{"description":"https://nvd.nist.gov/vuln/detail/CVE-2022-28194","items":{"type":"string"},"type":"array","uniqueItems":false},"text_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"url":{"description":"https://bdu.fstec.ru/vul/2022-03833","type":"string"},"vul_status_en":{"description":"Exploitable","type":"string"},"vul_status_ru":{"description":"Exploitable","type":"string"},"vulnerable_software":{"$ref":"#/components/schemas/advisory.BDUVulnerableSoftware"}},"type":"object"},"advisory.BDUCvss":{"description":"advisory.BDUCvss","properties":{"vector":{"$ref":"#/components/schemas/advisory.BDUVector"}},"type":"object"},"advisory.BDUCvss3":{"description":"advisory.BDUCvss3","properties":{"vector":{"$ref":"#/components/schemas/advisory.BDUVector"}},"type":"object"},"advisory.BDUEnvironment":{"description":"advisory.BDUEnvironment","properties":{"os":{"$ref":"#/components/schemas/advisory.BDUOs"}},"type":"object"},"advisory.BDUOs":{"description":"advisory.BDUOs","properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUSoft":{"description":"advisory.BDUSoft","properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"types":{"$ref":"#/components/schemas/advisory.BDUTypes"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUTypes":{"description":"advisory.BDUTypes","properties":{"text":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.BDUVector":{"description":"advisory.BDUVector","properties":{"score":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.BDUVulnerableSoftware":{"description":"advisory.BDUVulnerableSoftware","properties":{"soft":{"$ref":"#/components/schemas/advisory.BDUSoft"}},"type":"object"},"advisory.BLS":{"description":"advisory.BLS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"prodcut":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Bandr":{"description":"advisory.Bandr","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"document_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BaxterAdvisory":{"description":"advisory.BaxterAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeckhoffAdvisory":{"description":"advisory.BeckhoffAdvisory","properties":{"beckhoff_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"description":"if in the future we can delete this great - it's just a dupe to\nnormalize the field names","type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BeckmanCoulter":{"description":"advisory.BeckmanCoulter","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BectonDickinsonAdvisory":{"description":"advisory.BectonDickinsonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products_affected":{"items":{"$ref":"#/components/schemas/advisory.ProductsAffected"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeldenAdvisory":{"description":"advisory.BeldenAdvisory","properties":{"belden_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BeyondTrust":{"description":"advisory.BeyondTrust","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Binarly":{"description":"advisory.Binarly","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BitDefender":{"description":"advisory.BitDefender","properties":{"additional_details":{"type":"string"},"affected_products":{"type":"string"},"affected_vendors":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"details":{"type":"string"},"timeline":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BlackBerry":{"description":"advisory.BlackBerry","properties":{"bsrt":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BoschAdvisory":{"description":"advisory.BoschAdvisory","properties":{"bosch_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BostonScientificAdvisory":{"description":"advisory.BostonScientificAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Botnet":{"description":"advisory.Botnet","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"botnet_name":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Bugzilla":{"description":"advisory.Bugzilla","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CACyberCentreAdvisory":{"description":"advisory.CACyberCentreAdvisory","properties":{"control_systems":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"html_url":{"type":"string"},"serial_number":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CBLMariner":{"description":"advisory.CBLMariner","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CERTEUAdvisory":{"description":"advisory.CERTEUAdvisory","properties":{"advisoryId":{"type":"string"},"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"history":{"items":{"type":"string"},"type":"array"},"link":{"type":"string"},"recommendations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"technicalDetails":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CESA":{"description":"advisory.CESA","properties":{"arch":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"issueDate":{"type":"string"},"osRelease":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.CentosPackage"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CISAAlert":{"description":"advisory.CISAAlert","properties":{"AffectedProducts":{"type":"string"},"AlertID":{"type":"string"},"Archived":{"type":"boolean"},"CVEExploitedITW":{"type":"boolean"},"CVSS":{"type":"string"},"ICSMA":{"type":"boolean"},"Mitigations":{"type":"string"},"ReleaseDate":{"type":"string"},"Title":{"type":"string"},"Url":{"type":"string"},"Vendor":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CISControl":{"description":"advisory.CISControl","properties":{"cis_control_description":{"type":"string"},"cis_control_id":{"type":"string"},"cis_control_name":{"type":"string"}},"type":"object"},"advisory.CNNVDEntryJSON":{"description":"advisory.CNNVDEntryJSON","properties":{"bugtraq-id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"modified-date":{"type":"string"},"name_cn":{"type":"string"},"published-date":{"type":"string"},"severity_cn":{"type":"string"},"severity_en":{"type":"string"},"source":{"type":"string"},"url":{"type":"string"},"vuln-description_cn":{"type":"string"},"vuln-solution":{"type":"string"},"vuln-type_cn":{"type":"string"},"vuln-type_en":{"type":"string"}},"type":"object"},"advisory.CNVDBulletin":{"description":"advisory.CNVDBulletin","properties":{"cnta":{"type":"string"},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CNVDFlaw":{"description":"advisory.CNVDFlaw","properties":{"affected_products_cn":{"type":"string"},"bugtraq_id":{"type":"string"},"cnvd":{"type":"string"},"collection_time":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"harm_level":{"type":"string"},"id":{"type":"string"},"public_date":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"submission_time":{"type":"string"},"title_cn":{"type":"string"},"update_time":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"validation_info_cn":{"type":"string"},"validation_info_en":{"type":"string"},"vendor_patch_cn":{"type":"string"},"vuln_attachments":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vuln_description_cn":{"type":"string"},"vuln_solution_cn":{"type":"string"},"vuln_type_cn":{"type":"string"}},"type":"object"},"advisory.COSUpdate":{"description":"advisory.COSUpdate","properties":{"changed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"featured":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"reference":{"type":"string"},"security":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated":{"type":"string"}},"type":"object"},"advisory.CPEMatch":{"description":"advisory.CPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.CPENode":{"description":"advisory.CPENode","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.CPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.CSAF":{"description":"advisory.CSAF","properties":{"document":{"$ref":"#/components/schemas/advisory.DocumentMetadata"},"notes":{"description":"Notes holds notes associated with the whole document.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"product_tree":{"$ref":"#/components/schemas/advisory.ProductBranch"},"vulnerabilities":{"description":"Vulnerabilities contains information about the vulnerabilities,\n(i.e. CVEs), associated threats, and product status.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property","items":{"$ref":"#/components/schemas/advisory.CSAFVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CSAFDistribution":{"description":"advisory.CSAFDistribution","type":"object"},"advisory.CSAFNote":{"description":"advisory.CSAFNote","properties":{"audience":{"type":"string"},"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CSAFReference":{"description":"advisory.CSAFReference","properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CSAFRelationship":{"description":"advisory.CSAFRelationship","properties":{"category":{"type":"string"},"full_product_name":{"$ref":"#/components/schemas/advisory.Product"},"product_reference":{"type":"string"},"relates_to_product_reference":{"type":"string"}},"type":"object"},"advisory.CSAFScore":{"description":"advisory.CSAFScore","properties":{"cvss_v2":{"$ref":"#/components/schemas/advisory.CVSSV2"},"cvss_v3":{"$ref":"#/components/schemas/advisory.CVSSV3"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CSAFVulnerability":{"description":"advisory.CSAFVulnerability","properties":{"cve":{"description":"MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3232-vulnerabilities-property---cve","type":"string"},"cwe":{"$ref":"#/components/schemas/advisory.Cwe"},"flags":{"description":"Machine readable flags for products related to vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3235-vulnerabilities-property---flags","items":{"$ref":"#/components/schemas/advisory.Flag"},"type":"array","uniqueItems":false},"ids":{"description":"List of IDs represents a list of unique labels or tracking IDs for the vulnerability (if such information exists).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3236-vulnerabilities-property---ids","items":{"$ref":"#/components/schemas/advisory.TrackingID"},"type":"array","uniqueItems":false},"notes":{"description":"Notes holds notes associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3238-vulnerabilities-property---notes","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"product_status":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Provide details on the status of the referenced product related to the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3239-vulnerabilities-property---product-status","type":"object"},"references":{"description":"Vulnerability references holds a list of references associated with this vulnerability item.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32310-vulnerabilities-property---references","items":{"$ref":"#/components/schemas/advisory.CSAFReference"},"type":"array","uniqueItems":false},"release_date":{"type":"string"},"remediations":{"description":"Provide details of remediations associated with a Vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32312-vulnerabilities-property---remediations","items":{"$ref":"#/components/schemas/advisory.RemediationData"},"type":"array","uniqueItems":false},"scores":{"description":"Scores holds the scores associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32313-vulnerabilities-property---scores\nCurrently only CVSS v3 is supported.","items":{"$ref":"#/components/schemas/advisory.CSAFScore"},"type":"array","uniqueItems":false},"threats":{"description":"Provide details of threats associated with a vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32314-vulnerabilities-property---threats","items":{"$ref":"#/components/schemas/advisory.ThreatData"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CVEDetail":{"description":"advisory.CVEDetail","properties":{"baseScore":{"type":"string"},"cveid":{"type":"string"},"description":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.CVEDetailsLink":{"description":"advisory.CVEDetailsLink","properties":{"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.CVEReference":{"description":"advisory.CVEReference","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVSS":{"description":"advisory.CVSS","properties":{"score":{"type":"string"},"severity":{"type":"string"},"type":{"type":"string"},"vector":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV2":{"description":"advisory.CVSSV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"}},"type":"object"},"advisory.CVSSV3":{"description":"advisory.CVSSV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV40":{"description":"this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics","properties":{"Automatable":{"type":"string"},"Recovery":{"type":"string"},"Safety":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityRequirement":{"type":"string"},"exploitMaturity":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackRequirements":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedSubAvailabilityImpact":{"type":"string"},"modifiedSubConfidentialityImpact":{"type":"string"},"modifiedSubIntegrityImpact":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"modifiedVulnAvailabilityImpact":{"type":"string"},"modifiedVulnConfidentialityImpact":{"type":"string"},"modifiedVulnIntegrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.CVSSV40Threat":{"description":"advisory.CVSSV40Threat","properties":{"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"advisory.CWENode":{"description":"advisory.CWENode","type":"object"},"advisory.CanvasExploit":{"description":"advisory.CanvasExploit","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"exploit_pack":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Capec":{"description":"advisory.Capec","properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"advisory.CarestreamAdvisory":{"description":"advisory.CarestreamAdvisory","properties":{"carestream_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Carrier":{"description":"advisory.Carrier","properties":{"advisory_id":{"type":"string"},"affected_product":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CentosPackage":{"description":"advisory.CentosPackage","properties":{"filename":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CertBE":{"description":"advisory.CertBE","properties":{"affected_software":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability_type":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CertFRAdvisory":{"description":"advisory.CertFRAdvisory","properties":{"affected_systems_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resume_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"source_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIN":{"description":"advisory.CertIN","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIRSecurityAlert":{"description":"advisory.CertIRSecurityAlert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_fa":{"type":"string"},"title_fa":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertSE":{"description":"advisory.CertSE","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_sv":{"type":"string"},"title_sv":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertUA":{"description":"advisory.CertUA","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_ua":{"type":"string"},"title_ua":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ChainGuard":{"description":"advisory.ChainGuard","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.ChainGuardPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.ChainGuardPackage":{"description":"advisory.ChainGuardPackage","properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.ChainGuardSecFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ChainGuardSecFix":{"description":"advisory.ChainGuardSecFix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"}},"type":"object"},"advisory.CheckPoint":{"description":"advisory.CheckPoint","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Chrome":{"description":"advisory.Chrome","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AffectedChrome"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ciena":{"description":"advisory.Ciena","properties":{"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issue_no":{"type":"integer"},"security_advisory_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_products":{"items":{"$ref":"#/components/schemas/advisory.VulnerableProduct"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CisaCsafAdv":{"description":"advisory.CisaCsafAdv","properties":{"csaf_json":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoAdvisory":{"description":"advisory.CiscoAdvisory","properties":{"ciscoBugId":{"description":"multiple","type":"string"},"csaf":{"type":"string"},"cve":{"description":"multiple","items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf":{"type":"string"},"cwe":{"description":"multiple","type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"identifier":{"type":"string"},"name":{"type":"string"},"related_resources":{"type":"string"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"totalCount":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"},"workarounds":{"type":"string"},"workflowStatus":{"type":"string"}},"type":"object"},"advisory.CiscoCSAF":{"description":"advisory.CiscoCSAF","properties":{"csaf":{},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"identifier":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoKnownGoodValue":{"description":"advisory.CiscoKnownGoodValue","properties":{"biv_category":{"type":"string"},"biv_hash":{"type":"string"},"date_added":{"type":"string"},"dtype":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"platform":{"type":"string"},"published":{"type":"string"},"sha1":{"type":"string"},"sha256":{"type":"string"},"sha512":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CitrixAdvisory":{"description":"advisory.CitrixAdvisory","properties":{"citrixId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.ClarotyVulnerability":{"description":"advisory.ClarotyVulnerability","properties":{"advisory_url":{"type":"string"},"claroty_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v3":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"product":{"type":"string"},"target":{"type":"string"},"vendor":{"type":"string"},"vendor_advisory_url":{"type":"string"}},"type":"object"},"advisory.CloudBees":{"description":"advisory.CloudBees","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CloudVulnDBAdvisory":{"description":"advisory.CloudVulnDBAdvisory","properties":{"affectedServices":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CodesysAdvisory":{"description":"advisory.CodesysAdvisory","properties":{"codesys_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVault":{"description":"advisory.CommVault","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultCVEDetails"},"type":"array","uniqueItems":false},"cvss_range":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"impacted_product":{"$ref":"#/components/schemas/advisory.CommVaultImpactedProduct"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"resolution":{"$ref":"#/components/schemas/advisory.CommVaultResolution"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVaultCVEDetails":{"description":"advisory.CommVaultCVEDetails","properties":{"cve_id":{"type":"string"},"cvss":{"type":"string"},"description":{"type":"string"},"external_links":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultImpactedProduct":{"description":"advisory.CommVaultImpactedProduct","properties":{"description":{"type":"string"},"impacted_product_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultImpactedProductDetails"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultImpactedProductDetails":{"description":"advisory.CommVaultImpactedProductDetails","properties":{"affected_versions":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product_name":{"type":"string"},"resolved_versions":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.CommVaultResolution":{"description":"advisory.CommVaultResolution","properties":{"description":{"type":"string"},"resolution_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultResolutionDetails"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultResolutionDetails":{"description":"advisory.CommVaultResolutionDetails","properties":{"feature_release":{"type":"string"},"maintenance_release":{"type":"string"}},"type":"object"},"advisory.CompassSecurity":{"description":"advisory.CompassSecurity","properties":{"csnc_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"effect":{"type":"string"},"introduction":{"type":"string"},"product":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"risk":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.ContainerOS":{"description":"advisory.ContainerOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updates":{"items":{"$ref":"#/components/schemas/advisory.COSUpdate"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.CoreImpactExploit":{"description":"advisory.CoreImpactExploit","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"platform":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Correction":{"description":"advisory.Correction","properties":{"correctedAt":{"type":"string"},"orelease":{"type":"string"},"release":{"type":"string"}},"type":"object"},"advisory.Credit":{"description":"advisory.Credit","properties":{"lang":{"type":"string"},"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Crestron":{"description":"advisory.Crestron","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"threat":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CrowdSec":{"description":"advisory.CrowdSec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"eitw":{"type":"boolean"},"first_seen":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Curl":{"description":"advisory.Curl","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"info":{"$ref":"#/components/schemas/advisory.OCurl"},"url":{"type":"string"}},"type":"object"},"advisory.CurlAffected":{"description":"advisory.CurlAffected","properties":{"ranges":{"items":{"$ref":"#/components/schemas/advisory.CurlRange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CurlCWE":{"description":"advisory.CurlCWE","properties":{"desc":{"type":"string"},"id":{"type":"string"}},"type":"object"},"advisory.CurlCredit":{"description":"advisory.CurlCredit","properties":{"name":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CurlRange":{"description":"advisory.CurlRange","properties":{"events":{"items":{"additionalProperties":{"type":"string"},"type":"object"},"type":"array","uniqueItems":false},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CustomCPE":{"description":"advisory.CustomCPE","properties":{"mcpeapplicability":{"$ref":"#/components/schemas/advisory.MCPEApplicability"},"stringValue":{"type":"string"}},"type":"object"},"advisory.Cvrf":{"description":"advisory.Cvrf","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CvsssV2_3":{"description":"advisory.CvsssV2_3","properties":{"basescore":{"type":"string"},"temporalscore":{"type":"string"}},"type":"object"},"advisory.Cwe":{"description":"advisory.Cwe","properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CweAcceptanceLevel":{"description":"advisory.CweAcceptanceLevel","properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.CweData":{"description":"advisory.CweData","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Cwes":{"description":"advisory.Cwes","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.CWENode"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Cycle":{"description":"advisory.Cycle","properties":{"codename":{"type":"string"},"cycle":{"type":"string"},"discontinued":{},"eol":{},"extendedSupport":{},"latest":{"type":"string"},"latestReleaseDate":{"type":"string"},"link":{"type":"string"},"lts":{},"releaseDate":{"type":"string"},"releaseLabel":{"type":"string"},"support":{}},"type":"object"},"advisory.DBSpecific":{"description":"advisory.DBSpecific","properties":{"CWE":{"$ref":"#/components/schemas/advisory.CurlCWE"},"award":{"$ref":"#/components/schemas/advisory.Award"},"last_affected":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"url":{"type":"string"},"www":{"type":"string"}},"type":"object"},"advisory.DFNCert":{"description":"advisory.DFNCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_de":{"type":"string"},"title_de":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DLink":{"description":"advisory.DLink","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DNN":{"description":"advisory.DNN","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dahua":{"description":"advisory.Dahua","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DanFossCVEDetails":{"description":"advisory.DanFossCVEDetails","properties":{"base_score":{"type":"string"},"cve":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Danfoss":{"description":"advisory.Danfoss","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_details":{"items":{"$ref":"#/components/schemas/advisory.DanFossCVEDetails"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dassault":{"description":"advisory.Dassault","properties":{"affected_products":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DateTime":{"description":"advisory.DateTime","type":"object"},"advisory.DebianCVE":{"description":"advisory.DebianCVE","properties":{"cve":{"type":"string"},"debianbug":{"type":"integer"},"description":{"type":"string"},"releases":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianRelease"},"type":"array","uniqueItems":false},"scope":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DebianSecurityAdvisory":{"description":"advisory.DebianSecurityAdvisory","properties":{"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianPackage"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dsa":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dell":{"description":"advisory.Dell","properties":{"articleNumber":{"type":"string"},"combinedProductList":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dell_cves":{"items":{"$ref":"#/components/schemas/advisory.DellCVE"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DellCVE":{"description":"advisory.DellCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.DeltaAdvisory":{"description":"advisory.DeltaAdvisory","properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"recommendedAction":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.DistroPackage":{"description":"advisory.DistroPackage","properties":{"binary":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"license":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"secFixes":{"items":{"$ref":"#/components/schemas/advisory.SecFix"},"type":"array"},"versions":{"items":{"$ref":"#/components/schemas/advisory.DistroVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.DistroVersion":{"description":"advisory.DistroVersion","properties":{"arch":{"type":"string"},"published_date":{"type":"string"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Django":{"description":"advisory.Django","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DocumentMetadata":{"description":"Document contains metadata about the CSAF document itself.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property","properties":{"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/components/schemas/advisory.CSAFDistribution"},"lang":{"type":"string"},"notes":{"description":"used by ncsc","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"publisher":{"$ref":"#/components/schemas/advisory.Publisher"},"references":{"items":{"$ref":"#/components/schemas/advisory.CSAFReference"},"type":"array","uniqueItems":false},"title":{"description":"Aggregate severity is a vehicle that is provided by the document producer to convey the urgency and\ncriticality with which the one or more vulnerabilities reported should be addressed.","type":"string"},"tracking":{"$ref":"#/components/schemas/advisory.Tracking"}},"type":"object"},"advisory.DocumentPublisher":{"description":"advisory.DocumentPublisher","properties":{"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"type":{"description":"the json for this is missing/broke","type":"integer"}},"type":"object"},"advisory.DotCMS":{"description":"advisory.DotCMS","properties":{"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"issue_id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DragosAdvisory":{"description":"advisory.DragosAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.Draytek":{"description":"advisory.Draytek","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Drupal":{"description":"advisory.Drupal","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"project":{"type":"string"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLAlibaba":{"description":"advisory.EOLAlibaba","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"eol_date":{"type":"string"},"eol_name":{"type":"string"},"product":{"type":"string"},"release_date":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.EOLMicrosoft":{"description":"advisory.EOLMicrosoft","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"edition":{"type":"string"},"extended_end_date":{"type":"string"},"mainstream_date":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"release_end_date":{"type":"string"},"release_start_date":{"type":"string"},"retirement_date":{"type":"string"},"start_date":{"type":"string"},"support_policy":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLReleaseData":{"description":"advisory.EOLReleaseData","properties":{"already_eol":{"type":"boolean"},"branch":{"description":"Alpine Linux","type":"string"},"branch_url":{"description":"Alpine Linux","type":"string"},"codename":{"type":"string"},"cpe":{"type":"string"},"eol_date":{"type":"string"},"eol_date_extended_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_date_premier_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_elts_date":{"type":"string"},"eol_lts_date":{"type":"string"},"git_branch":{"description":"Alpine Linux","type":"string"},"git_branch_url":{"description":"Alpine Linux","type":"string"},"lts":{"description":"Ubuntu","type":"boolean"},"minor_releases":{"description":"Alpine Linux","items":{"type":"string"},"type":"array","uniqueItems":false},"product":{"type":"string"},"release_date":{"type":"string"},"release_name":{"type":"string"},"source_url":{"type":"string"},"technology_level":{"description":"AIX","type":"string"},"vendor":{"type":"string"},"version":{"type":"string"},"version_api":{"description":"Android","type":"string"},"version_darwin":{"description":"macOS","type":"string"},"version_sunos":{"description":"Solaris","type":"string"},"windows_current_build":{"description":"Microsoft Windows","type":"string"},"windows_display_version":{"description":"Microsoft Windows","type":"string"},"windows_edition_id":{"description":"Microsoft Windows","type":"string"},"windows_insider_preview":{"description":"Microsoft Windows","type":"boolean"}},"type":"object"},"advisory.EUVD":{"description":"advisory.EUVD","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"assigner":{"type":"string"},"base_score":{"type":"number"},"base_score_vector":{"type":"string"},"base_score_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"enisa_id_product":{"items":{"$ref":"#/components/schemas/advisory.EnisaIDProduct"},"type":"array","uniqueItems":false},"enisa_id_vendor":{"items":{"$ref":"#/components/schemas/advisory.EnisaIDVendor"},"type":"array","uniqueItems":false},"epss":{"type":"number"},"exploited":{"description":"This field is exploited field from endpoint /api/vulnerabilities.\napidocs : https://euvd.enisa.europa.eu/apidoc\nNote: There are records where exploited_since is populated with a valid date,\nbut it still shows up under non_exploitable data set","type":"boolean"},"exploited_since":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.EatonAdvisory":{"description":"advisory.EatonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"eaton_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EcoSystem":{"description":"advisory.EcoSystem","properties":{"severity":{"type":"string"},"spl":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Elastic":{"description":"advisory.Elastic","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"esaid":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Elspec":{"description":"advisory.Elspec","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmergingThreatsSnort":{"description":"advisory.EmergingThreatsSnort","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"rev":{"type":"string"},"rule_disabled":{"type":"boolean"},"rule_name":{"type":"string"},"sid":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmersonAdvisory":{"description":"advisory.EmersonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"emerson_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EndOfLife":{"description":"advisory.EndOfLife","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cycles":{"items":{"$ref":"#/components/schemas/advisory.Cycle"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Endress":{"description":"advisory.Endress","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EnisaIDProduct":{"description":"advisory.EnisaIDProduct","properties":{"id":{"type":"string"},"product_name":{"type":"string"},"product_version":{"type":"string"}},"type":"object"},"advisory.EnisaIDVendor":{"description":"advisory.EnisaIDVendor","properties":{"id":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.Event":{"description":"advisory.Event","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"},"last_affected":{"type":"string"},"limit":{"type":"string"}},"type":"object"},"advisory.ExodusIntel":{"description":"advisory.ExodusIntel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"disclosed_public":{"type":"string"},"disclosed_vendor":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExploitDBExploitv2":{"description":"advisory.ExploitDBExploitv2","properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"edb_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExternalReferences":{"description":"advisory.ExternalReferences","properties":{"description":{"type":"string"},"external_id":{"type":"string"},"source_name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.F5":{"description":"advisory.F5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FSecure":{"description":"advisory.FSecure","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fanuc":{"description":"advisory.Fanuc","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fastly":{"description":"advisory.Fastly","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Festo":{"description":"advisory.Festo","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileCloud":{"description":"advisory.FileCloud","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileZilla":{"description":"advisory.FileZilla","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FixAff":{"description":"advisory.FixAff","properties":{"affected_since":{"type":"string"},"fixed_version":{"type":"string"},"patch_url":{"type":"string"}},"type":"object"},"advisory.Flag":{"description":"advisory.Flag","properties":{"date":{"type":"string"},"group_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"label":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.FlattSecurity":{"description":"advisory.FlattSecurity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ForgeRock":{"description":"advisory.ForgeRock","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FortinetAdvisory":{"description":"advisory.FortinetAdvisory","properties":{"acknowledgement":{"type":"string"},"affectedProducts":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvssv3":{"type":"string"},"date_added":{"type":"string"},"irnumber":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solutions":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.FortinetIPS":{"description":"advisory.FortinetIPS","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"epss":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Foxit":{"description":"advisory.Foxit","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.FoxitAffected"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FoxitAffected":{"description":"advisory.FoxitAffected","properties":{"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Fresenius":{"description":"advisory.Fresenius","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GCP":{"description":"advisory.GCP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEGas":{"description":"advisory.GEGas","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEHealthcareAdvisory":{"description":"advisory.GEHealthcareAdvisory","properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHAdvisoryJSONLean":{"description":"advisory.GHAdvisoryJSONLean","properties":{"classification":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"$ref":"#/components/schemas/advisory.GHCvss"},"cwes":{"$ref":"#/components/schemas/advisory.Cwes"},"databaseId":{"type":"integer"},"date_added":{"type":"string"},"description":{"type":"string"},"ghsaId":{"type":"string"},"id":{"type":"string"},"identifiers":{"items":{"$ref":"#/components/schemas/advisory.GHIdentifier"},"type":"array","uniqueItems":false},"notificationsPermalink":{"type":"string"},"origin":{"type":"string"},"permalink":{"type":"string"},"publishedAt":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GHReference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"vulnerabilities":{"$ref":"#/components/schemas/advisory.GHVulnerabilities"},"withdrawnAt":{"type":"string"}},"type":"object"},"advisory.GHCvss":{"description":"advisory.GHCvss","properties":{"score":{"type":"number"},"vectorString":{"type":"string"}},"type":"object"},"advisory.GHIdentifier":{"description":"advisory.GHIdentifier","properties":{"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.GHNode":{"description":"advisory.GHNode","properties":{"package":{"$ref":"#/components/schemas/advisory.GHPackage"},"severity":{"type":"string"},"updatedAt":{"type":"string"},"vulnerableVersionRange":{"type":"string"}},"type":"object"},"advisory.GHPackage":{"description":"advisory.GHPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHReference":{"description":"advisory.GHReference","properties":{"url":{"type":"string"}},"type":"object"},"advisory.GHSA":{"description":"advisory.GHSA","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"ghsa":{"$ref":"#/components/schemas/advisory.OriginalGHSA"},"url":{"type":"string"}},"type":"object"},"advisory.GHSAAffected":{"description":"advisory.GHSAAffected","properties":{"ecosystem_specific":{"$ref":"#/components/schemas/advisory.GHSAEcoSystemSpecific"},"package":{"$ref":"#/components/schemas/advisory.GHSAPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.GHSARange"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GHSADatabaseSpecific":{"description":"advisory.GHSADatabaseSpecific","properties":{"cwe_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"github_reviewed":{"type":"boolean"},"github_reviewed_at":{"type":"string"},"nvd_published_at":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.GHSAEcoSystemSpecific":{"description":"advisory.GHSAEcoSystemSpecific","properties":{"affected_functions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GHSAEvent":{"description":"advisory.GHSAEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GHSAPackage":{"description":"advisory.GHSAPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHSARange":{"description":"advisory.GHSARange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.GHSAEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.GHSAReference":{"description":"advisory.GHSAReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHSASeverity":{"description":"advisory.GHSASeverity","properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.GHVulnerabilities":{"description":"advisory.GHVulnerabilities","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.GHNode"},"type":"array","uniqueItems":false},"totalCount":{"type":"integer"}},"type":"object"},"advisory.GMOCyberSecurity":{"description":"advisory.GMOCyberSecurity","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gallagher":{"description":"advisory.Gallagher","properties":{"activeExploitation":{"type":"boolean"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixes":{"type":"string"},"reportedBy":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gen":{"description":"advisory.Gen","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"description":"not all of them have this","type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GenericEOL":{"description":"advisory.GenericEOL","properties":{"core":{"$ref":"#/components/schemas/advisory.GenericEOLCore"},"product":{"$ref":"#/components/schemas/advisory.GenericEOLProduct"},"vcInfo":{"$ref":"#/components/schemas/advisory.GenericEOLVCInfo"}},"type":"object"},"advisory.GenericEOLCore":{"description":"advisory.GenericEOLCore","properties":{"end_of_life":{"type":"string"},"end_of_sales":{"type":"string"},"end_of_security_support":{"type":"string"},"last_updated":{"type":"string"}},"type":"object"},"advisory.GenericEOLProduct":{"description":"advisory.GenericEOLProduct","properties":{"product_name":{"type":"string"},"product_version":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.GenericEOLReference":{"description":"advisory.GenericEOLReference","properties":{"description":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GenericEOLVCInfo":{"description":"advisory.GenericEOLVCInfo","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GenericEOLReference"},"type":"array","uniqueItems":false},"replacement":{"$ref":"#/components/schemas/advisory.GenericEOLProduct"},"updated_at":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Genetec":{"description":"advisory.Genetec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gigabyte":{"description":"advisory.Gigabyte","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.GitHubExploit":{"description":"advisory.GitHubExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"currently_trending":{"type":"boolean"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"id":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitLabExploit":{"description":"advisory.GitLabExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GiteeExploit":{"description":"advisory.GiteeExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitlabAdvisory":{"description":"advisory.GitlabAdvisory","properties":{"affected_range":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v2":{"type":"string"},"cvss_v3":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"fixed_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ghsa":{"items":{"type":"string"},"type":"array","uniqueItems":false},"gitlab_url":{"type":"string"},"identifier":{"type":"string"},"identifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"not_impacted":{"type":"string"},"package_manager":{"type":"string"},"package_name":{"type":"string"},"package_slug":{"type":"string"},"pubdate":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"uuid":{"type":"string"}},"type":"object"},"advisory.Glibc":{"description":"advisory.Glibc","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GnuTLS":{"description":"advisory.GnuTLS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GoCredits":{"description":"advisory.GoCredits","properties":{"name":{"type":"string"}},"type":"object"},"advisory.GoEvent":{"description":"advisory.GoEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GoVulnAffected":{"description":"advisory.GoVulnAffected","properties":{"database_specific":{"$ref":"#/components/schemas/advisory.GoVulnDatabaseSpecific"},"ecosystem_specific":{"$ref":"#/components/schemas/advisory.GoVulnEcosystemSpecific"},"package":{"$ref":"#/components/schemas/advisory.GoVulnPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.GoVulnRanges"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnDatabaseSpecific":{"description":"advisory.GoVulnDatabaseSpecific","properties":{"url":{"type":"string"}},"type":"object"},"advisory.GoVulnEcosystemSpecific":{"description":"advisory.GoVulnEcosystemSpecific","properties":{"imports":{"items":{"$ref":"#/components/schemas/advisory.GoVulnImport"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnImport":{"description":"advisory.GoVulnImport","properties":{"path":{"type":"string"},"symbols":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnJSON":{"description":"advisory.GoVulnJSON","properties":{"advisory_url":{"type":"string"},"affected":{"items":{"$ref":"#/components/schemas/advisory.GoVulnAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.GoCredits"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"ghsa":{"items":{"type":"string"},"type":"array","uniqueItems":false},"go_advisory_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GoVulnReference"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnPackage":{"description":"advisory.GoVulnPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GoVulnRanges":{"description":"advisory.GoVulnRanges","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.GoEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.GoVulnReference":{"description":"advisory.GoVulnReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Grafana":{"description":"advisory.Grafana","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseDetection":{"description":"advisory.GreyNoiseDetection","properties":{"category":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"label":{"type":"string"},"name":{"type":"string"},"recommend_block":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"related_tags":{"items":{"$ref":"#/components/schemas/advisory.GreyNoiseTags"},"type":"array","uniqueItems":false},"slug":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseTags":{"description":"advisory.GreyNoiseTags","properties":{"category":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"name":{"type":"string"},"slug":{"type":"string"}},"type":"object"},"advisory.HCL":{"description":"advisory.HCL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HIKVision":{"description":"advisory.HIKVision","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.HKCert":{"description":"advisory.HKCert","properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"relatedLinks":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"solutions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.HMS":{"description":"advisory.HMS","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HP":{"description":"advisory.HP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.HPE":{"description":"advisory.HPE","properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hacktivity":{"description":"advisory.Hacktivity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"float64":{"type":"number"},"rank":{"type":"integer"},"reports_submitted":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HardwareUpdate":{"description":"advisory.HardwareUpdate","properties":{"affectedVersions":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"hardwarePlatform":{"type":"string"},"system":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.HarmonyOS":{"description":"advisory.HarmonyOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HashiCorp":{"description":"advisory.HashiCorp","properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HaskellAffected":{"description":"advisory.HaskellAffected","properties":{"affected_constraint":{"type":"string"},"affected_versions":{"items":{"$ref":"#/components/schemas/advisory.HaskellVersion"},"type":"array","uniqueItems":false},"arch":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"os":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package":{"type":"string"}},"type":"object"},"advisory.HaskellSADBAdvisory":{"description":"advisory.HaskellSADBAdvisory","properties":{"advisory_id":{"type":"string"},"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.HaskellAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"integer"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"keywords":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"type":"object"},"related_vulns":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"}},"type":"object"},"advisory.HaskellVersion":{"description":"advisory.HaskellVersion","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.HillromAdvisory":{"description":"advisory.HillromAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hitachi":{"description":"advisory.Hitachi","properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixedProducts":{"type":"string"},"hitachiId":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HitachiEnergy":{"description":"advisory.HitachiEnergy","properties":{"advisory_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploited":{"type":"boolean"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Honeywell":{"description":"advisory.Honeywell","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Huawei":{"description":"advisory.Huawei","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"sa_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiEulerOS":{"description":"advisory.HuaweiEulerOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"packages":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"synopsis":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiIPS":{"description":"advisory.HuaweiIPS","properties":{"cnnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"name":{"type":"string"},"severity":{"type":"string"},"threat_id":{"type":"integer"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.IAVA":{"description":"advisory.IAVA","properties":{"IAVA":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.IBM":{"description":"advisory.IBM","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ITW":{"description":"advisory.ITW","properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.ITWExploit":{"description":"advisory.ITWExploit","properties":{"advisory":{"type":"string"},"affected_versions":{"type":"string"},"analysis_url":{"type":"string"},"bug_introducing_change_list_url":{"type":"string"},"claimed_attribution":{"type":"string"},"claimed_attribution_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_discovered":{"type":"string"},"date_patched":{"type":"string"},"description":{"type":"string"},"first_patched_version":{"type":"string"},"patch_change_list_url":{"type":"string"},"product":{"type":"string"},"reported_by":{"type":"string"},"root_cause_analysis_url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_type":{"type":"string"}},"type":"object"},"advisory.IVal":{"description":"advisory.IVal","properties":{"Value":{"type":"string"}},"type":"object"},"advisory.Idemia":{"description":"advisory.Idemia","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"sbid":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IdentificationHelper":{"additionalProperties":{},"description":"advisory.IdentificationHelper","type":"object"},"advisory.Igel":{"description":"advisory.Igel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Impact":{"description":"advisory.Impact","properties":{"capecId":{"type":"string"},"descriptions":{"items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.IncibeAdvisory":{"description":"advisory.IncibeAdvisory","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"detail":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Intel":{"description":"advisory.Intel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.IpIntelRecord":{"description":"advisory.IpIntelRecord","properties":{"asn":{"type":"string"},"city":{"type":"string"},"country":{"type":"string"},"country_code":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"feed_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"hostnames":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ip":{"type":"string"},"lastSeen":{"type":"string"},"matches":{"items":{"type":"string"},"type":"array","uniqueItems":false},"port":{"type":"integer"},"ssl":{"type":"boolean"},"type":{"$ref":"#/components/schemas/advisory.RecordType"}},"type":"object"},"advisory.IsraeliAlert":{"description":"advisory.IsraeliAlert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details_he":{"type":"string"},"handling_he":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_he":{"type":"string"},"title_he":{"type":"string"}},"type":"object"},"advisory.IsraeliVulnerability":{"description":"advisory.IsraeliVulnerability","properties":{"ILVNId":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Issued":{"description":"advisory.Issued","type":"object"},"advisory.Istio":{"description":"advisory.Istio","properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ivanti":{"description":"advisory.Ivanti","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IvantiRSS":{"description":"advisory.IvantiRSS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JFrog":{"description":"advisory.JFrog","properties":{"cpes":{"items":{"$ref":"#/components/schemas/advisory.NVD20CVECPEMatch"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"product":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.JNJAdvisory":{"description":"advisory.JNJAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVN":{"description":"advisory.JVN","properties":{"affected_en":{"type":"string"},"affected_ja":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_en":{"type":"string"},"description_ja":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"solution_en":{"type":"string"},"solution_ja":{"type":"string"},"summary_en":{"type":"string"},"summary_ja":{"type":"string"},"title_en":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVNAdvisoryItem":{"description":"advisory.JVNAdvisoryItem","properties":{"cpe":{"items":{"$ref":"#/components/schemas/advisory.JVNCPE"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"items":{"$ref":"#/components/schemas/advisory.CVSS"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"description_en":{"type":"string"},"identifier":{"type":"string"},"issued":{"type":"string"},"modified":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.JVNReference"},"type":"array","uniqueItems":false},"title":{"type":"string"},"title_en":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"url_en":{"type":"string"}},"type":"object"},"advisory.JVNCPE":{"description":"advisory.JVNCPE","properties":{"cpe":{"type":"string"},"product":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.JVNReference":{"description":"advisory.JVNReference","properties":{"id":{"type":"string"},"source":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Jenkins":{"description":"advisory.Jenkins","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fix":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.JetBrains":{"description":"advisory.JetBrains","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"resolved_in":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JohnsonControls":{"description":"advisory.JohnsonControls","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Juniper":{"description":"advisory.Juniper","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss3_score":{"type":"string"},"cvss3_vector":{"type":"string"},"cvss4_score":{"type":"string"},"cvss4_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.K8S":{"description":"advisory.K8S","properties":{"content":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issue_id":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.KEVCatalogVulnerability":{"description":"advisory.KEVCatalogVulnerability","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"notes":{"type":"string"},"product":{"type":"string"},"requiredAction":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.KRCertAdvisory":{"description":"advisory.KRCertAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_ko":{"type":"string"},"link":{"type":"string"},"overview_ko":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title_ko":{"type":"string"}},"type":"object"},"advisory.KasperskyICSCERTAdvisory":{"description":"advisory.KasperskyICSCERTAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"klcert_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kb":{"description":"advisory.Kb","properties":{"kb_url":{"type":"string"},"ms_date_added":{"type":"string"},"status":{"type":"string"},"supercedence":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.KbThreatDescription":{"description":"advisory.KbThreatDescription","properties":{"dos":{"type":"string"},"exploited":{"type":"string"},"latest_software_release":{"type":"string"},"level":{"items":{"type":"string"},"type":"array","uniqueItems":false},"older_software_release":{"type":"string"},"publicly_disclosed":{"type":"string"},"type":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.KoreLogic":{"description":"advisory.KoreLogic","properties":{"affected_product":{"type":"string"},"affected_vendor":{"type":"string"},"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kunbus":{"description":"advisory.Kunbus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LG":{"description":"advisory.LG","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lantronix":{"description":"advisory.Lantronix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lenovo":{"description":"advisory.Lenovo","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"industry_identifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"last_updated":{"type":"string"},"lenovo_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LexmarkAdvisory":{"description":"advisory.LexmarkAdvisory","properties":{"affectedProducts":{"items":{"$ref":"#/components/schemas/advisory.AffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"impact":{"type":"string"},"lastUpdate":{"type":"string"},"link":{"type":"string"},"publicReleaseDate":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"revision":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"workarounds":{"type":"string"}},"type":"object"},"advisory.LibreOffice":{"description":"advisory.LibreOffice","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Linux":{"description":"advisory.Linux","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LogSource":{"description":"advisory.LogSource","properties":{"category":{"type":"string"},"definition":{"type":"string"},"product":{"type":"string"},"service":{"type":"string"}},"type":"object"},"advisory.LolAdvs":{"description":"advisory.LolAdvs","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"lol_json":{"additionalProperties":{},"type":"object"},"mitre_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MACert":{"description":"advisory.MACert","properties":{"affected_systems_fr":{"type":"string"},"assessment_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact_fr":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"title_fr":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MAffected":{"description":"advisory.MAffected","properties":{"collectionURL":{"type":"string"},"cpes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"defaultStatus":{"type":"string"},"packageName":{"type":"string"},"packageURL":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product":{"type":"string"},"repo":{"type":"string"},"vendor":{"type":"string"},"versions":{"items":{"$ref":"#/components/schemas/advisory.MVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MBranch":{"description":"advisory.MBranch","properties":{"Branch":{"items":{"$ref":"#/components/schemas/advisory.MBranch"},"type":"array","uniqueItems":false},"FullProductName":{"items":{"$ref":"#/components/schemas/advisory.MFullProductName"},"type":"array","uniqueItems":false},"Items":{"items":{"$ref":"#/components/schemas/advisory.MItem"},"type":"array","uniqueItems":false},"name":{"type":"string"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MCPEApplicability":{"description":"advisory.MCPEApplicability","properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/components/schemas/advisory.MNodes"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"advisory.MCPEMatch":{"description":"advisory.MCPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.MCna":{"description":"advisory.MCna","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"cpeApplicability":{"items":{"$ref":"#/components/schemas/advisory.CustomCPE"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.Credit"},"type":"array","uniqueItems":false},"descriptions":{"items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false},"impacts":{"items":{"$ref":"#/components/schemas/advisory.Impact"},"type":"array","uniqueItems":false},"metrics":{"items":{"$ref":"#/components/schemas/advisory.Metric"},"type":"array","uniqueItems":false},"problemTypes":{"items":{"$ref":"#/components/schemas/advisory.MProblemTypes"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/components/schemas/advisory.MReference"},"type":"array","uniqueItems":false},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"timeline":{"items":{"$ref":"#/components/schemas/advisory.Timeline"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.MContainers":{"description":"advisory.MContainers","properties":{"adp":{"items":{"$ref":"#/components/schemas/advisory.ADPContainer"},"type":"array","uniqueItems":false},"cna":{"$ref":"#/components/schemas/advisory.MCna"}},"type":"object"},"advisory.MCveMetadata":{"description":"advisory.MCveMetadata","properties":{"assignerOrgId":{"type":"string"},"assignerShortName":{"type":"string"},"cveId":{"type":"string"},"datePublished":{"type":"string"},"dateReserved":{"type":"string"},"dateUpdated":{"type":"string"},"state":{"type":"string"}},"type":"object"},"advisory.MCvssV20":{"description":"advisory.MCvssV20","properties":{"accessVector":{"type":"string"},"attackComplexity":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV30":{"description":"advisory.MCvssV30","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV31":{"description":"advisory.MCvssV31","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV40":{"description":"advisory.MCvssV40","properties":{"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"automatable":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"recovery":{"type":"string"},"safety":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.MDescriptions":{"description":"advisory.MDescriptions","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MDocumentTracking":{"description":"advisory.MDocumentTracking","properties":{"CurrentReleaseDate":{"type":"string"},"InitialReleaseDate":{"type":"string"},"identification":{"$ref":"#/components/schemas/advisory.MIdentification"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/components/schemas/advisory.RRevision"},"type":"array","uniqueItems":false},"status":{"description":"again - change in json/xml","type":"integer"},"version":{"type":"string"}},"type":"object"},"advisory.MEProduct":{"description":"advisory.MEProduct","properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.MFiles":{"description":"advisory.MFiles","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MFullProductName":{"description":"advisory.MFullProductName","properties":{"CPE":{"type":"string"},"ProductID":{"type":"string"},"Value":{"type":"string"}},"type":"object"},"advisory.MISPValueNoID":{"description":"advisory.MISPValueNoID","properties":{"description":{"type":"string"},"meta":{"$ref":"#/components/schemas/advisory.MispMeta"},"related":{"items":{"$ref":"#/components/schemas/advisory.MispRelatedItem"},"type":"array","uniqueItems":false},"value":{"type":"string"}},"type":"object"},"advisory.MITREAttackGroupNoID":{"description":"advisory.MITREAttackGroupNoID","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"name":{"type":"string"},"techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechnique"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MIdentification":{"description":"advisory.MIdentification","properties":{"alias":{"$ref":"#/components/schemas/advisory.IVal"},"id":{"$ref":"#/components/schemas/advisory.IVal"}},"type":"object"},"advisory.MItem":{"description":"advisory.MItem","properties":{"Items":{"items":{"$ref":"#/components/schemas/advisory.MItem"},"type":"array","uniqueItems":false},"Name":{"type":"string"},"ProductID":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Value":{"type":"string"}},"type":"object"},"advisory.MNodes":{"description":"advisory.MNodes","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.MCPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.MProblemTypes":{"description":"advisory.MProblemTypes","properties":{"descriptions":{"items":{"$ref":"#/components/schemas/advisory.PTMDescriptions"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MProductStatus":{"description":"advisory.MProductStatus","properties":{"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MProductTree":{"description":"advisory.MProductTree","properties":{"Branch":{"items":{"$ref":"#/components/schemas/advisory.MBranch"},"type":"array","uniqueItems":false},"FullProductName":{"items":{"$ref":"#/components/schemas/advisory.MFullProductName"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MProviderMetadata":{"description":"OK","properties":{"dateUpdated":{"description":"FIXME: flip to time","type":"string"},"orgId":{"type":"string"},"shortName":{"type":"string"}},"type":"object"},"advisory.MReference":{"description":"advisory.MReference","properties":{"name":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.MRemediation":{"description":"advisory.MRemediation","properties":{"AffectedFiles":{"items":{"$ref":"#/components/schemas/advisory.AffectedFile"},"type":"array","uniqueItems":false},"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/components/schemas/advisory.IVal"},"FixedBuild":{"type":"string"},"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"RestartRequired":{"$ref":"#/components/schemas/advisory.IVal"},"SubType":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Url":{"type":"string"},"supercedence":{"type":"string"}},"type":"object"},"advisory.MSCVRF":{"description":"advisory.MSCVRF","properties":{"DocumentTitle":{"$ref":"#/components/schemas/advisory.MSDocumentTitle"},"DocumentTracking":{"$ref":"#/components/schemas/advisory.MDocumentTracking"},"ProductTree":{"$ref":"#/components/schemas/advisory.MProductTree"},"document_type":{"type":"string"},"documentnotes":{"description":"diff","items":{"$ref":"#/components/schemas/advisory.RNote"},"type":"array","uniqueItems":false},"documentpublisher":{"$ref":"#/components/schemas/advisory.DocumentPublisher"},"vulnerability":{"items":{"$ref":"#/components/schemas/advisory.MVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MSDocumentTitle":{"description":"advisory.MSDocumentTitle","properties":{"Value":{"type":"string"}},"type":"object"},"advisory.MVersion":{"description":"advisory.MVersion","properties":{"lessThan":{"type":"string"},"lessThanOrEqual":{"type":"string"},"status":{"type":"string"},"version":{"type":"string"},"versionType":{"type":"string"}},"type":"object"},"advisory.MVulnerability":{"description":"advisory.MVulnerability","properties":{"ProductStatuses":{"items":{"$ref":"#/components/schemas/advisory.MProductStatus"},"type":"array","uniqueItems":false},"Remediations":{"items":{"$ref":"#/components/schemas/advisory.MRemediation"},"type":"array","uniqueItems":false},"Threats":{"items":{"$ref":"#/components/schemas/advisory.RThreat"},"type":"array","uniqueItems":false},"acknowledgments":{"items":{"$ref":"#/components/schemas/advisory.Acknowledgement"},"type":"array","uniqueItems":false},"cve":{"type":"string"},"cvssscoresets":{"items":{"$ref":"#/components/schemas/advisory.RScoreSet"},"type":"array","uniqueItems":false},"notes":{"items":{"$ref":"#/components/schemas/advisory.Note"},"type":"array","uniqueItems":false},"ordinal":{"type":"string"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/components/schemas/advisory.RRevision"},"type":"array","uniqueItems":false},"title":{"$ref":"#/components/schemas/advisory.IVal"}},"type":"object"},"advisory.MaliciousPackage":{"description":"advisory.MaliciousPackage","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"malware":{"$ref":"#/components/schemas/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MaliciousVSCodeExts":{"description":"advisory.MaliciousVSCodeExts","properties":{"date_added":{"type":"string"},"name":{"type":"string"},"publisher":{"type":"string"},"type":{"type":"string"},"updated_at":{"description":"the data in this feed comes from manual curation. so this will likely be omitted.","type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.ManageEngine":{"description":"advisory.ManageEngine","properties":{"ADVISORY":{"type":"string"},"Added_Time":{"type":"string"},"CVE_Details_Link":{"$ref":"#/components/schemas/advisory.CVEDetailsLink"},"CVE_ID":{"type":"string"},"CVSS_Severity_Rating":{"type":"string"},"Fixed":{"type":"string"},"For_product_search":{"type":"string"},"ID":{"type":"string"},"Product":{"$ref":"#/components/schemas/advisory.MEProduct"},"Product_list":{"items":{"$ref":"#/components/schemas/advisory.MEProduct"},"type":"array","uniqueItems":false},"Product_specific_details":{"items":{"$ref":"#/components/schemas/advisory.ProductSpecificDetail"},"type":"array","uniqueItems":false},"Summary":{"type":"string"},"Version":{"type":"string"},"index_field":{"type":"string"}},"type":"object"},"advisory.ManageEngineAdvisory":{"description":"advisory.ManageEngineAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"manage_engine":{"$ref":"#/components/schemas/advisory.ManageEngine"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MbedTLS":{"description":"advisory.MbedTLS","properties":{"affects":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfee":{"description":"advisory.McAfee","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mcafee_score":{"items":{"$ref":"#/components/schemas/advisory.McAfeeScore"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfeeScore":{"description":"advisory.McAfeeScore","properties":{"base":{"type":"string"},"cve":{"type":"string"},"temporal":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.Mediatek":{"description":"advisory.Mediatek","properties":{"affected_chipsets":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_software":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MedtronicAdvisory":{"description":"advisory.MedtronicAdvisory","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mendix":{"description":"advisory.Mendix","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"mendix_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaAdvisories":{"description":"advisory.MetaAdvisories","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaData":{"description":"advisory.MetaData","properties":{"advisory":{"$ref":"#/components/schemas/advisory.AdvisoryDetails"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckPackage"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.OvalReference"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.MetasploitExploit":{"description":"advisory.MetasploitExploit","properties":{"author":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Metric":{"description":"advisory.Metric","properties":{"cvssV2_0":{"$ref":"#/components/schemas/advisory.MCvssV20"},"cvssV3_0":{"$ref":"#/components/schemas/advisory.MCvssV30"},"cvssV3_1":{"$ref":"#/components/schemas/advisory.MCvssV31"},"cvssV4_0":{"$ref":"#/components/schemas/advisory.MCvssV40"},"format":{"type":"string"},"other":{"$ref":"#/components/schemas/advisory.MetricsOther"},"scenarios":{"items":{"$ref":"#/components/schemas/advisory.MetricScenario"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MetricScenario":{"description":"advisory.MetricScenario","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MetricsOther":{"description":"advisory.MetricsOther","properties":{"content":{"type":"object"},"type":{"type":"string"}},"type":"object"},"advisory.MicrosoftCSAF":{"description":"advisory.MicrosoftCSAF","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftCVRF":{"description":"advisory.MicrosoftCVRF","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf":{"$ref":"#/components/schemas/advisory.MSCVRF"},"date_added":{"type":"string"},"exploited_list":{"items":{"$ref":"#/components/schemas/advisory.ITW"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftDriverBlockList":{"description":"advisory.MicrosoftDriverBlockList","properties":{"date_added":{"type":"string"},"file_id":{"description":"From FileAttrib or Deny","type":"string"},"file_metadata":{"$ref":"#/components/schemas/advisory.MicrosoftFileMetadata"}},"type":"object"},"advisory.MicrosoftFileMetadata":{"description":"File-level metadata","properties":{"file_name":{"description":"Full path (FilePath + FileName or FriendlyName)","type":"string"},"maximum_file_version":{"type":"string"},"minimum_file_version":{"type":"string"},"product_name":{"type":"string"},"sha1_hash":{"type":"string"},"sha256_hash":{"type":"string"}},"type":"object"},"advisory.MicrosoftKb":{"description":"advisory.MicrosoftKb","properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"kbs":{"items":{"$ref":"#/components/schemas/advisory.Kb"},"type":"array","uniqueItems":false},"threat":{"$ref":"#/components/schemas/advisory.KbThreatDescription"},"title":{"type":"string"}},"type":"object"},"advisory.Mikrotik":{"description":"advisory.Mikrotik","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mindray":{"description":"advisory.Mindray","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MispMeta":{"description":"advisory.MispMeta","properties":{"attribution-confidence":{"type":"string"},"cfr-suspected-state-sponsor":{"type":"string"},"cfr-suspected-victims":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cfr-target-category":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cfr-type-of-incident":{"items":{"type":"string"},"type":"array","uniqueItems":false},"country":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"synonyms":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MispRelatedItem":{"description":"advisory.MispRelatedItem","properties":{"dest-uuid":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.MispValue":{"description":"advisory.MispValue","properties":{"description":{"type":"string"},"meta":{"$ref":"#/components/schemas/advisory.MispMeta"},"related":{"items":{"$ref":"#/components/schemas/advisory.MispRelatedItem"},"type":"array","uniqueItems":false},"uuid":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Mitel":{"description":"advisory.Mitel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackRef":{"description":"advisory.MitreAttackRef","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechWithRefs":{"description":"advisory.MitreAttackTechWithRefs","properties":{"domain":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"},"nist_controls":{"items":{"$ref":"#/components/schemas/advisory.NISTControl"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackRef"},"type":"array","uniqueItems":false},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechnique":{"description":"advisory.MitreAttackTechnique","properties":{"sub_technique":{"type":"string"},"sub_technique_name":{"type":"string"},"tactic":{"items":{"type":"string"},"type":"array","uniqueItems":false},"technique_id":{"type":"string"},"technique_name":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5":{"description":"advisory.MitreCVEListV5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5Ref":{"description":"advisory.MitreCVEListV5Ref","properties":{"containers":{"$ref":"#/components/schemas/advisory.MContainers"},"cveMetadata":{"$ref":"#/components/schemas/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.MitreGroupCTI":{"description":"advisory.MitreGroupCTI","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.ExternalReferences"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MitsubishiElectricAdvisory":{"description":"advisory.MitsubishiElectricAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"description":"could nuke this at some pt in the future as it's a dupe","type":"string"},"mitsubishi_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MongoDB":{"description":"advisory.MongoDB","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MoxaAdvisory":{"description":"advisory.MoxaAdvisory","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaAdvisory":{"description":"advisory.MozillaAdvisory","properties":{"affected_components":{"items":{"$ref":"#/components/schemas/advisory.MozillaComponent"},"type":"array","uniqueItems":false},"bugzilla":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_in":{"items":{"type":"string"},"type":"array","uniqueItems":false},"impact":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"reporter":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaComponent":{"description":"advisory.MozillaComponent","properties":{"bugzilla":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"impact":{"type":"string"},"reporter":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.NCSC":{"description":"advisory.NCSC","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NCSCCVE":{"description":"advisory.NCSCCVE","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NEC":{"description":"advisory.NEC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"nvd_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NHS":{"description":"advisory.NHS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"summary":{"type":"string"},"threat_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NI":{"description":"advisory.NI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"ovewrview":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NISTControl":{"description":"advisory.NISTControl","properties":{"cis_controls":{"items":{"$ref":"#/components/schemas/advisory.CISControl"},"type":"array","uniqueItems":false},"nist_control_family":{"type":"string"},"nist_control_id":{"type":"string"},"nist_control_name":{"type":"string"}},"type":"object"},"advisory.NTP":{"description":"advisory.NTP","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NVD20CVECPEMatch":{"description":"advisory.NVD20CVECPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.NVD20Configuration":{"description":"advisory.NVD20Configuration","properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/components/schemas/advisory.NVD20Node"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Node":{"description":"advisory.NVD20Node","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.NVD20CVECPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Source":{"description":"advisory.NVD20Source","properties":{"contactEmail":{"type":"string"},"created":{"type":"string"},"cweAcceptanceLevel":{"$ref":"#/components/schemas/advisory.CweAcceptanceLevel"},"lastModified":{"type":"string"},"name":{"type":"string"},"sourceIdentifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"v3AcceptanceLevel":{"$ref":"#/components/schemas/advisory.V3AcceptanceLevel"}},"type":"object"},"advisory.NVDCPEDictionary":{"description":"advisory.NVDCPEDictionary","properties":{"backupOnly":{"type":"string"}},"type":"object"},"advisory.NZAdvisory":{"description":"advisory.NZAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"happening":{"type":"string"},"link":{"type":"string"},"lookFor":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"whatToDo":{"type":"string"}},"type":"object"},"advisory.Naver":{"description":"advisory.Naver","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nessus":{"description":"advisory.Nessus","properties":{"cpe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploitability_ease":{"description":"seems like only 3 vals for this","type":"string"},"filename":{"type":"string"},"iava":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"script_id":{"type":"integer"},"updated":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NetApp":{"description":"advisory.NetApp","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact":{"type":"string"},"ntap":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netatalk":{"description":"advisory.Netatalk","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgate":{"description":"advisory.Netgate","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgear":{"description":"advisory.Netgear","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"psvn_number":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netskope":{"description":"advisory.Netskope","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nexpose":{"description":"advisory.Nexpose","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"identifier":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NginxAdvisory":{"description":"advisory.NginxAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"not_vuln_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false},"patch_pgp":{"type":"string"},"patch_url":{"type":"string"},"severity":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vuln_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.NodeAuthor":{"description":"advisory.NodeAuthor","properties":{"author":{"type":"string"},"username":{"type":"string"},"website":{"type":"string"}},"type":"object"},"advisory.NodeJS":{"description":"advisory.NodeJS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NodeSecurity":{"description":"advisory.NodeSecurity","properties":{"affected_environments":{"items":{"type":"string"},"type":"array","uniqueItems":false},"author":{"$ref":"#/components/schemas/advisory.NodeAuthor"},"coordinating_vendor":{"type":"string"},"created_at":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"number"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"module_name":{"type":"string"},"overview":{"type":"string"},"patched_versions":{"type":"string"},"publish_date":{"type":"string"},"recommendation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerable_versions":{"type":"string"}},"type":"object"},"advisory.Nokia":{"description":"advisory.Nokia","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Note":{"description":"advisory.Note","properties":{"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"integer"}},"type":"object"},"advisory.NotePadPlusPlus":{"description":"advisory.NotePadPlusPlus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nozomi":{"description":"advisory.Nozomi","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nuclei":{"description":"advisory.Nuclei","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"template":{"type":"object"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NvidiaRevision":{"description":"advisory.NvidiaRevision","properties":{"date":{"type":"string"},"description":{"type":"string"},"revision":{"type":"string"}},"type":"object"},"advisory.OCurl":{"description":"advisory.OCurl","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.CurlAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.CurlCredit"},"type":"array","uniqueItems":false},"database_specific":{"$ref":"#/components/schemas/advisory.DBSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"schema_version":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.OSV":{"description":"advisory.OSV","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"osv":{"$ref":"#/components/schemas/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OSVObj":{"description":"advisory.OSVObj","properties":{"affected":{"description":"collection based on https://ossf.github.io/osv-schema/","items":{"$ref":"#/components/schemas/advisory.Affected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.OSVReference"},"type":"array","uniqueItems":false},"related":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"withdrawn":{"type":"string"}},"type":"object"},"advisory.OSVPackage":{"description":"advisory.OSVPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.OSVReference":{"description":"advisory.OSVReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OTRS":{"description":"advisory.OTRS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OctopusDeploy":{"description":"advisory.OctopusDeploy","properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Okta":{"description":"advisory.Okta","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"resolution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Omron":{"description":"advisory.Omron","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OneE":{"description":"advisory.OneE","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenBSD":{"description":"advisory.OpenBSD","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"patch":{"type":"string"},"release":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenCVDB":{"description":"advisory.OpenCVDB","properties":{"affected_platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_services":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"disclosed_at":{"type":"string"},"known_itw_exploitation":{"type":"boolean"},"manual_remediation":{"type":"string"},"published_at":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDK":{"description":"advisory.OpenJDK","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"openjdk_cves":{"items":{"$ref":"#/components/schemas/advisory.OpenJDKCVE"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDKCVE":{"description":"advisory.OpenJDKCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.OpenSSH":{"description":"advisory.OpenSSH","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenSSLSecAdv":{"description":"advisory.OpenSSLSecAdv","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/advisory.OpenSSLVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OpenSSLVulnerability":{"description":"advisory.OpenSSLVulnerability","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"$ref":"#/components/schemas/advisory.FixAff"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OpenStack":{"description":"advisory.OpenStack","properties":{"affects":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Opengear":{"description":"advisory.Opengear","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPU":{"description":"advisory.OracleCPU","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"product":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPUCSAF":{"description":"advisory.OracleCPUCSAF","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OriginalGHSA":{"description":"advisory.OriginalGHSA","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.GHSAAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"database_specific":{"$ref":"#/components/schemas/advisory.GHSADatabaseSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GHSAReference"},"type":"array","uniqueItems":false},"schema_version":{"type":"string"},"severity":{"items":{"$ref":"#/components/schemas/advisory.GHSASeverity"},"type":"array","uniqueItems":false},"summary":{"type":"string"}},"type":"object"},"advisory.OvalCVE":{"description":"advisory.OvalCVE","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OvalReference":{"description":"advisory.OvalReference","properties":{"ref_id":{"type":"string"},"ref_url":{"type":"string"},"source":{"type":"string"}},"type":"object"},"advisory.Override":{"description":"advisory.Override","properties":{"_annotation":{"$ref":"#/components/schemas/advisory.OverrideAnnotation"},"cve":{"$ref":"#/components/schemas/advisory.OverrideCVE"}},"type":"object"},"advisory.OverrideAnnotation":{"description":"advisory.OverrideAnnotation","properties":{"cve_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"reason":{"type":"string"},"snapshot":{"type":"string"},"triage_notes":{"$ref":"#/components/schemas/advisory.TriageNotes"}},"type":"object"},"advisory.OverrideCVE":{"description":"advisory.OverrideCVE","properties":{"configurations":{"items":{"$ref":"#/components/schemas/advisory.OverrideConfiguration"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OverrideConfiguration":{"description":"advisory.OverrideConfiguration","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.CPENode"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OwnCloud":{"description":"advisory.OwnCloud","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PGFix":{"description":"advisory.PGFix","properties":{"affected":{"type":"string"},"fixed":{"type":"string"}},"type":"object"},"advisory.PHPMyAdmin":{"description":"advisory.PHPMyAdmin","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PKCert":{"description":"advisory.PKCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTC":{"description":"advisory.PTC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTMDescriptions":{"description":"advisory.PTMDescriptions","properties":{"cweId":{"type":"string"},"description":{"type":"string"},"lang":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Package":{"description":"advisory.Package","properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.PackageStat":{"description":"advisory.PackageStat","properties":{"cpe":{"type":"string"},"fix_state":{"type":"string"},"package_name":{"type":"string"},"product_name":{"type":"string"}},"type":"object"},"advisory.PacketstormExploit":{"description":"advisory.PacketstormExploit","properties":{"author":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"download_url":{"type":"string"},"md5":{"type":"string"},"summary":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Palantir":{"description":"advisory.Palantir","properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaloAltoAdvisory":{"description":"advisory.PaloAltoAdvisory","properties":{"affected":{"type":"string"},"applicableVersions":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"confidentialityImpact":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvssbaseScore":{"type":"string"},"datePublished":{"type":"string"},"dateUpdated":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"problem":{"type":"string"},"product":{"type":"string"},"scope":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"unaffected":{"type":"string"},"url":{"type":"string"},"userInteraction":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.Panasonic":{"description":"advisory.Panasonic","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaperCut":{"description":"advisory.PaperCut","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Patch":{"description":"advisory.Patch","properties":{"advisory_id":{"type":"string"},"component":{"type":"string"},"link":{"type":"string"},"os_sw":{"type":"string"}},"type":"object"},"advisory.Pega":{"description":"advisory.Pega","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhilipsAdvisory":{"description":"advisory.PhilipsAdvisory","properties":{"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhoenixContactAdvisory":{"description":"advisory.PhoenixContactAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.PostgresSQL":{"description":"advisory.PostgresSQL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"pg_fix":{"items":{"$ref":"#/components/schemas/advisory.PGFix"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PowerDNS":{"description":"advisory.PowerDNS","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PrimeVersion":{"description":"advisory.PrimeVersion","properties":{"jdK":{"type":"string"},"prime":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Product":{"description":"advisory.Product","properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/components/schemas/advisory.IdentificationHelper"}},"type":"object"},"advisory.ProductBranch":{"description":"ProductTree contains information about the product tree (branches only).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.ProductBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/components/schemas/advisory.Product"},"relationships":{"items":{"$ref":"#/components/schemas/advisory.CSAFRelationship"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ProductSpecificDetail":{"description":"advisory.ProductSpecificDetail","properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.ProductsAffected":{"description":"advisory.ProductsAffected","properties":{"cve":{"type":"string"},"description":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.Progress":{"description":"advisory.Progress","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Proofpoint":{"description":"advisory.Proofpoint","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Publisher":{"description":"advisory.Publisher","properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.PureStorage":{"description":"advisory.PureStorage","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PyPAAdvisory":{"description":"advisory.PyPAAdvisory","properties":{"advisory_id":{"description":"ID is the PYSEC- identifier","type":"string"},"affected":{"description":"Affected will list out the vulnerable versions.","items":{"$ref":"#/components/schemas/advisory.PyPAAffected"},"type":"array","uniqueItems":false},"aliases":{"description":"Aliases are other identifiers that refer to this, such as a CVE","items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"description":"Details discuss the vulnerability information","type":"string"},"modified":{"description":"Modified is non-zero Time if entry was updated","type":"string"},"published":{"description":"Published is the datetime when this was released","type":"string"},"references":{"description":"References are links to more detailed advisories, fixes, etc.","items":{"$ref":"#/components/schemas/advisory.PyPAReference"},"type":"array","uniqueItems":false},"was_withdrawn":{"description":"WasWD indicates if the advisory was withdrawn or not.","type":"boolean"},"withdrawn":{"description":"Withdrawn is non-zero if this advisory has been withdrawn","type":"string"}},"type":"object"},"advisory.PyPAAffected":{"description":"advisory.PyPAAffected","properties":{"package":{"$ref":"#/components/schemas/advisory.PyPAPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.PyPARange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.PyPAEvent":{"description":"advisory.PyPAEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.PyPAPackage":{"description":"advisory.PyPAPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.PyPARange":{"description":"advisory.PyPARange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.PyPAEvent"},"type":"array","uniqueItems":false},"ranges_type":{"type":"string"}},"type":"object"},"advisory.PyPAReference":{"description":"advisory.PyPAReference","properties":{"refs_type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QNAPAdvisory":{"description":"advisory.QNAPAdvisory","properties":{"affected":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"last_update_date":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"severity_number":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.QQID":{"description":"advisory.QQID","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss3_score":{"type":"string"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"qid":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QSB":{"description":"advisory.QSB","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualcomm":{"description":"advisory.Qualcomm","properties":{"chipsets":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualys":{"description":"advisory.Qualys","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploits":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QualysQID":{"description":"advisory.QualysQID","properties":{"consequence":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v2":{"items":{"$ref":"#/components/schemas/advisory.CvsssV2_3"},"type":"array","uniqueItems":false},"cvss_v3":{"items":{"$ref":"#/components/schemas/advisory.CvsssV2_3"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_insert":{"type":"string"},"description":{"type":"string"},"patches":{"items":{"$ref":"#/components/schemas/advisory.Patch"},"type":"array","uniqueItems":false},"published":{"type":"string"},"qid":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor_refs":{"items":{"$ref":"#/components/schemas/advisory.VendorRef"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RDescription":{"description":"advisory.RDescription","properties":{"value":{"type":"string"}},"type":"object"},"advisory.RNote":{"description":"advisory.RNote","properties":{"audience":{"type":"string"},"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"description":"diff between xml \u0026\u0026 json","type":"integer"}},"type":"object"},"advisory.RRevision":{"description":"advisory.RRevision","properties":{"date":{"type":"string"},"description":{"$ref":"#/components/schemas/advisory.RDescription"},"number":{"type":"string"}},"type":"object"},"advisory.RScoreSet":{"description":"advisory.RScoreSet","properties":{"base_score":{"type":"string"},"product_id":{"type":"string"},"temporal_score":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.RThreat":{"description":"advisory.RThreat","properties":{"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/components/schemas/advisory.IVal"},"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"Type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.Range":{"description":"advisory.Range","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.Event"},"type":"array","uniqueItems":false},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RansomwareExploit":{"description":"advisory.RansomwareExploit","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"ransomware_family":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RecordType":{"description":"advisory.RecordType","properties":{"finding":{"type":"string"},"id":{"type":"string"},"kind":{"type":"string"}},"type":"object"},"advisory.RedLion":{"description":"advisory.RedLion","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RedhatCVE":{"description":"advisory.RedhatCVE","properties":{"advisories":{"items":{"type":"string"},"type":"array","uniqueItems":false},"advisory_csaf_vex_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_packages":{"description":"used for un-marshlling from redhat","items":{"type":"string"},"type":"array","uniqueItems":false},"affected_release":{"items":{"$ref":"#/components/schemas/advisory.AffectedRel"},"type":"array","uniqueItems":false},"bugzilla":{"type":"string"},"bugzilla_description":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_csaf_vex_url":{"type":"string"},"cvss3_score":{"type":"string"},"cvss3_scoring_vector":{"type":"string"},"cvss_score":{"type":"number"},"cvss_scoring_vector":{"type":"string"},"cwe":{"type":"string"},"package_state":{"items":{"$ref":"#/components/schemas/advisory.PackageStat"},"type":"array","uniqueItems":false},"packages":{"description":"used to index into vulncheck OS","items":{"$ref":"#/components/schemas/advisory.VulnCheckPackage"},"type":"array","uniqueItems":false},"public_date":{"type":"string"},"resource_url":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Reference":{"description":"advisory.Reference","properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RelatedRule":{"description":"advisory.RelatedRule","properties":{"id":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RemediationData":{"description":"advisory.RemediationData","properties":{"category":{"type":"string"},"date":{"type":"string"},"details":{"type":"string"},"entitlements":{"items":{"type":"string"},"type":"array","uniqueItems":false},"group_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"restart_required":{"$ref":"#/components/schemas/advisory.RestartData"}},"type":"object"},"advisory.Renesas":{"description":"advisory.Renesas","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ReportedExploit":{"description":"advisory.ReportedExploit","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RestartData":{"description":"advisory.RestartData","properties":{"category":{"type":"string"},"details":{"type":"string"}},"type":"object"},"advisory.RevisionHistory":{"description":"advisory.RevisionHistory","properties":{"date":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Revive":{"description":"advisory.Revive","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RhelCVE":{"description":"advisory.RhelCVE","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Roche":{"description":"advisory.Roche","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"roche_cves":{"items":{"$ref":"#/components/schemas/advisory.RocheCVE"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RocheCVE":{"description":"advisory.RocheCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.Rockwell":{"description":"advisory.Rockwell","properties":{"affected_products":{"items":{"$ref":"#/components/schemas/advisory.RockwellAffectedProduct"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RockwellAffectedProduct":{"description":"advisory.RockwellAffectedProduct","properties":{"affectedCatalogNumber":{"type":"string"},"affectedVersion":{"type":"string"},"correctedVersion":{"type":"string"},"cve":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.RockyAdvisory":{"description":"advisory.RockyAdvisory","properties":{"affectedProducts":{"items":{"type":"string"},"type":"array","uniqueItems":false},"buildReferences":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cves":{"items":{"$ref":"#/components/schemas/advisory.RockyCve"},"type":"array","uniqueItems":false},"description":{"type":"string"},"fixes":{"items":{"$ref":"#/components/schemas/advisory.RockyFix"},"type":"array","uniqueItems":false},"name":{"type":"string"},"publishedAt":{"type":"string"},"rebootSuggested":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"rpms":{"$ref":"#/components/schemas/advisory.RockyRpms"},"severity":{"type":"string"},"shortCode":{"type":"string"},"solution":{"type":"string"},"synopsis":{"type":"string"},"topic":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RockyCve":{"description":"advisory.RockyCve","properties":{"cvss3BaseScore":{"type":"string"},"cvss3ScoringVector":{"type":"string"},"cwe":{"type":"string"},"name":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"}},"type":"object"},"advisory.RockyErrata":{"description":"advisory.RockyErrata","properties":{"advisory":{"$ref":"#/components/schemas/advisory.RockyAdvisory"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.RockyPackage"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.RockyFix":{"description":"advisory.RockyFix","properties":{"description":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"},"ticket":{"type":"string"}},"type":"object"},"advisory.RockyPackage":{"description":"advisory.RockyPackage","properties":{"distro":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.RockyRpms":{"additionalProperties":{"$ref":"#/components/schemas/advisory.RockyVersion"},"description":"advisory.RockyRpms","type":"object"},"advisory.RockyVersion":{"description":"advisory.RockyVersion","properties":{"nvras":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Rsync":{"description":"advisory.Rsync","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ruckus":{"description":"advisory.Ruckus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RustsecAdvisory":{"description":"advisory.RustsecAdvisory","properties":{"advisory":{"$ref":"#/components/schemas/advisory.RustsecFrontMatterAdvisory"},"affected":{"$ref":"#/components/schemas/advisory.RustsecAffected"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"versions":{"$ref":"#/components/schemas/advisory.RustsecFrontMatterVersions"}},"type":"object"},"advisory.RustsecAffected":{"description":"advisory.RustsecAffected","properties":{"arch":{"items":{"type":"string"},"type":"array","uniqueItems":false},"functions":{"type":"string"},"os":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RustsecFrontMatterAdvisory":{"description":"advisory.RustsecFrontMatterAdvisory","properties":{"aliases":{"description":"Vulnerability aliases, e.g. CVE IDs (optional but recommended)\nRequest a CVE for your RustSec vulns: https://iwantacve.org/","items":{"type":"string"},"type":"array","uniqueItems":false},"categories":{"description":"Optional: Categories this advisory falls under. Valid categories are:\n\"code-execution\", \"crypto-failure\", \"denial-of-service\", \"file-disclosure\"\n\"format-injection\", \"memory-corruption\", \"memory-exposure\", \"privilege-escalation\"","items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"description":"Optional: a Common Vulnerability Scoring System score. More information\ncan be found on the CVSS website, https://www.first.org/cvss/.","type":"string"},"date":{"description":"Disclosure date of the advisory as an RFC 3339 date (mandatory)","type":"string"},"informational":{"description":"Optional: Indicates the type of informational security advisory\n - \"unsound\" for soundness issues\n - \"unmaintained\" for crates that are no longer maintained\n - \"notice\" for other informational notices","type":"string"},"keywords":{"description":"Freeform keywords which describe this vulnerability, similar to Cargo (optional)","items":{"type":"string"},"type":"array","uniqueItems":false},"package":{"description":"Name of the affected crate (mandatory)","type":"string"},"references":{"description":"URL to additional helpful references regarding the advisory (optional)","items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"description":"Related vulnerabilities (optional)\ne.g. CVE for a C library wrapped by a -sys crate)","items":{"type":"string"},"type":"array","uniqueItems":false},"rustsec_id":{"description":"Identifier for the advisory (mandatory). Will be assigned a \"RUSTSEC-YYYY-NNNN\"\nidentifier e.g. RUSTSEC-2018-0001. Please use \"RUSTSEC-0000-0000\" in PRs.","type":"string"},"url":{"description":"URL to a long-form description of this issue, e.g. a GitHub issue/PR,\na change log entry, or a blogpost announcing the release (optional)","type":"string"},"withdrawn":{"description":"Whether the advisory is withdrawn (optional)","type":"string"}},"type":"object"},"advisory.RustsecFrontMatterVersions":{"description":"advisory.RustsecFrontMatterVersions","properties":{"patched":{"items":{"type":"string"},"type":"array","uniqueItems":false},"unaffected":{"description":"Versions which were never vulnerable (optional)","items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SAAdvisory":{"description":"advisory.SAAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"threats":{"type":"string"},"vendor":{"type":"string"},"warningDate":{"type":"string"},"warningNumber":{"type":"string"}},"type":"object"},"advisory.SAP":{"description":"advisory.SAP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SECConsult":{"description":"advisory.SECConsult","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SSASource":{"description":"advisory.SSASource","properties":{"document":{"$ref":"#/components/schemas/advisory.SiemensDocument"},"product_tree":{"$ref":"#/components/schemas/advisory.SiemensProductTree"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/advisory.SiemensVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SSDAdvisory":{"description":"advisory.SSDAdvisory","properties":{"analysis":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"poc":{"description":"contains actual poc code","type":"string"},"published":{"type":"string"},"response_ref":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.Safran":{"description":"advisory.Safran","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SaintExploit":{"description":"advisory.SaintExploit","properties":{"bid":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"osvdb":{"type":"string"},"saint_id":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SalesForce":{"description":"advisory.SalesForce","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Samba":{"description":"advisory.Samba","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issues":{"type":"string"},"patches":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sandisk":{"description":"advisory.Sandisk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SansDshield":{"description":"advisory.SansDshield","properties":{"count":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"firstSeen":{"type":"string"},"lastSeen":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SchneiderCVE":{"description":"advisory.SchneiderCVE","properties":{"cve":{"type":"string"},"cvss_score3":{"type":"string"},"cvss_score4":{"type":"string"},"cvss_vector3":{"type":"string"},"cvss_vector4":{"type":"string"}},"type":"object"},"advisory.SchneiderElectricAdvisory":{"description":"advisory.SchneiderElectricAdvisory","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"pdf_url":{"type":"string"},"schneider_cves":{"items":{"$ref":"#/components/schemas/advisory.SchneiderCVE"},"type":"array","uniqueItems":false},"schneider_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Schutzwerk":{"description":"advisory.Schutzwerk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SecFix":{"description":"advisory.SecFix","properties":{"arch":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SecurityBulletin":{"description":"advisory.SecurityBulletin","properties":{"acknowledgement":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvedetails":{"items":{"$ref":"#/components/schemas/advisory.CVEDetail"},"type":"array"},"date_added":{"type":"string"},"hardwareUpdates":{"items":{"$ref":"#/components/schemas/advisory.HardwareUpdate"},"type":"array"},"lastUpdated":{"type":"string"},"link":{"type":"string"},"revisions":{"items":{"$ref":"#/components/schemas/advisory.NvidiaRevision"},"type":"array"},"severity":{"type":"string"},"softwareUpdates":{"items":{"$ref":"#/components/schemas/advisory.SoftwareUpdate"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SecurityLab":{"description":"advisory.SecurityLab","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.SeebugExploit":{"description":"advisory.SeebugExploit","properties":{"author":{"type":"string"},"category":{"type":"string"},"cnnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"component":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"find_time":{"type":"string"},"name":{"type":"string"},"ssv_id":{"type":"string"},"submitter":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sel":{"description":"advisory.Sel","properties":{"acknowledgement":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SentinelOne":{"description":"advisory.SentinelOne","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ServiceNow":{"description":"advisory.ServiceNow","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SevenZip":{"description":"advisory.SevenZip","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Severity":{"description":"advisory.Severity","properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ShadowServerExploitedVulnerability":{"description":"advisory.ShadowServerExploitedVulnerability","properties":{"cnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"detections_last_1_day":{"type":"integer"},"detections_last_30_days":{"type":"integer"},"detections_last_7_days":{"type":"integer"},"detections_last_90_days":{"type":"integer"},"edb":{"type":"string"},"in_kev":{"type":"boolean"},"is_iot":{"type":"boolean"},"is_ransomware":{"type":"boolean"},"product":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_id":{"type":"string"},"vulnerability_link":{"type":"string"}},"type":"object"},"advisory.Shielder":{"description":"advisory.Shielder","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sick":{"description":"advisory.Sick","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SiemensAcknowledgments":{"description":"advisory.SiemensAcknowledgments","properties":{"names":{"items":{"type":"string"},"type":"array","uniqueItems":false},"organization":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensAdvisory":{"description":"advisory.SiemensAdvisory","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf_url":{"type":"string"},"date_added":{"type":"string"},"html_url":{"type":"string"},"id":{"type":"string"},"last_update":{"description":"could potentially kill this in the future as it's a dupe","type":"string"},"pdf_url":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ssa":{"$ref":"#/components/schemas/advisory.SSASource"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"txt_url":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SiemensBranch":{"description":"advisory.SiemensBranch","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensSubBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensCVSSV3":{"description":"advisory.SiemensCVSSV3","properties":{"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensCWE":{"description":"advisory.SiemensCWE","properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensDistribution":{"description":"advisory.SiemensDistribution","properties":{"text":{"type":"string"},"tlp":{"$ref":"#/components/schemas/advisory.SiemensTLP"}},"type":"object"},"advisory.SiemensDocument":{"description":"advisory.SiemensDocument","properties":{"acknowledgments":{"items":{"$ref":"#/components/schemas/advisory.SiemensAcknowledgments"},"type":"array","uniqueItems":false},"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/components/schemas/advisory.SiemensDistribution"},"notes":{"items":{"$ref":"#/components/schemas/advisory.SiemensNotes"},"type":"array","uniqueItems":false},"publisher":{"$ref":"#/components/schemas/advisory.SiemensPublisher"},"references":{"items":{"$ref":"#/components/schemas/advisory.SiemensReferences"},"type":"array","uniqueItems":false},"title":{"type":"string"},"tracking":{"$ref":"#/components/schemas/advisory.SiemensTracking"}},"type":"object"},"advisory.SiemensEngine":{"description":"advisory.SiemensEngine","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensGenerator":{"description":"advisory.SiemensGenerator","properties":{"engine":{"$ref":"#/components/schemas/advisory.SiemensEngine"}},"type":"object"},"advisory.SiemensNotes":{"description":"advisory.SiemensNotes","properties":{"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensProduct":{"description":"advisory.SiemensProduct","properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/components/schemas/advisory.SiemensProductIdentificationHelper"}},"type":"object"},"advisory.SiemensProductIdentificationHelper":{"description":"advisory.SiemensProductIdentificationHelper","properties":{"model_numbers":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensProductStatus":{"description":"advisory.SiemensProductStatus","properties":{"known_affected":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensProductTree":{"description":"advisory.SiemensProductTree","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensBranch"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensPublisher":{"description":"advisory.SiemensPublisher","properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.SiemensReferences":{"description":"advisory.SiemensReferences","properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRemediation":{"description":"advisory.SiemensRemediation","properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRevisionHistory":{"description":"advisory.SiemensRevisionHistory","properties":{"date":{"type":"string"},"legacy_version":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensScore":{"description":"advisory.SiemensScore","properties":{"cvss_v3":{"$ref":"#/components/schemas/advisory.SiemensCVSSV3"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensSubBranch":{"description":"advisory.SiemensSubBranch","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensSubSubBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensSubSubBranch":{"description":"advisory.SiemensSubSubBranch","properties":{"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/components/schemas/advisory.SiemensProduct"}},"type":"object"},"advisory.SiemensTLP":{"description":"advisory.SiemensTLP","properties":{"label":{"type":"string"}},"type":"object"},"advisory.SiemensTracking":{"description":"advisory.SiemensTracking","properties":{"current_release_date":{"type":"string"},"generator":{"$ref":"#/components/schemas/advisory.SiemensGenerator"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/components/schemas/advisory.SiemensRevisionHistory"},"type":"array","uniqueItems":false},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensVulnerability":{"description":"advisory.SiemensVulnerability","properties":{"cve":{"type":"string"},"cwe":{"$ref":"#/components/schemas/advisory.SiemensCWE"},"notes":{"items":{"$ref":"#/components/schemas/advisory.SiemensNotes"},"type":"array","uniqueItems":false},"product_status":{"$ref":"#/components/schemas/advisory.SiemensProductStatus"},"references":{"items":{"$ref":"#/components/schemas/advisory.SiemensReferences"},"type":"array","uniqueItems":false},"remediations":{"items":{"$ref":"#/components/schemas/advisory.SiemensRemediation"},"type":"array","uniqueItems":false},"scores":{"items":{"$ref":"#/components/schemas/advisory.SiemensScore"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SierraWireless":{"description":"advisory.SierraWireless","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"swid":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRule":{"description":"advisory.SigmaRule","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_attack_techniques":{"items":{"type":"string"},"type":"array","uniqueItems":false},"sigma_rule":{"$ref":"#/components/schemas/advisory.SigmaRuleRule"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRuleRule":{"description":"advisory.SigmaRuleRule","properties":{"author":{"type":"string"},"date":{"type":"string"},"description":{"type":"string"},"detection":{"additionalProperties":{},"type":"object"},"false_positives":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fields":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"level":{"type":"string"},"logsource":{"$ref":"#/components/schemas/advisory.LogSource"},"modified":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"items":{"$ref":"#/components/schemas/advisory.RelatedRule"},"type":"array","uniqueItems":false},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SingCert":{"description":"advisory.SingCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"}},"type":"object"},"advisory.Sitecore":{"description":"advisory.Sitecore","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"summary_ja":{"type":"string"},"title":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Slackware":{"description":"advisory.Slackware","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SoftwareUpdate":{"description":"advisory.SoftwareUpdate","properties":{"affectedVersion":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"operatingSystem":{"type":"string"},"softwareProduct":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.SolarWindsAdvisory":{"description":"advisory.SolarWindsAdvisory","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Solr":{"description":"advisory.Solr","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sonatype":{"description":"advisory.Sonatype","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SonicWallAdvisory":{"description":"advisory.SonicWallAdvisory","properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"impact":{"type":"string"},"is_workaround_available":{"type":"boolean"},"last_updated_when":{"type":"string"},"published_when":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vuln_status":{"type":"string"},"vulnerable_products_list":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SpacelabsHealthcareAdvisory":{"description":"advisory.SpacelabsHealthcareAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Splunk":{"description":"advisory.Splunk","properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"$ref":"#/components/schemas/advisory.SplunkProduct"},"type":"array","uniqueItems":false},"bug_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SplunkProduct":{"description":"advisory.SplunkProduct","properties":{"affected_version":{"type":"string"},"component":{"type":"string"},"fixed_version":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Spring":{"description":"advisory.Spring","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Stormshield":{"description":"advisory.Stormshield","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.StrykerAdvisory":{"description":"advisory.StrykerAdvisory","properties":{"affected_components":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sudo":{"description":"advisory.Sudo","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"fix":{"type":"string"},"impact":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.SuseSecurity":{"description":"advisory.SuseSecurity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SwisslogHealthcareAdvisory":{"description":"advisory.SwisslogHealthcareAdvisory","properties":{"affected_components":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Symfony":{"description":"advisory.Symfony","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synacktiv":{"description":"advisory.Synacktiv","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SyncroSoft":{"description":"advisory.SyncroSoft","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synology":{"description":"advisory.Synology","properties":{"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"last_updated":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Syss":{"description":"advisory.Syss","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TI":{"description":"advisory.TI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"incident_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TPLink":{"description":"advisory.TPLink","properties":{"bulletin_id":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TWCertAdvisory":{"description":"advisory.TWCertAdvisory","properties":{"affected_cn":{"type":"string"},"affected_en":{"type":"string"},"credit_cn":{"type":"string"},"credit_en":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_cn":{"type":"string"},"description_en":{"type":"string"},"link":{"type":"string"},"solution_cn":{"type":"string"},"solution_en":{"type":"string"},"title_cn":{"type":"string"},"title_en":{"type":"string"},"tvnid":{"type":"string"}},"type":"object"},"advisory.Tailscale":{"description":"advisory.Tailscale","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TalosAdvisory":{"description":"advisory.TalosAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"talos_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TeamViewer":{"description":"advisory.TeamViewer","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TenableResearchAdvisory":{"description":"advisory.TenableResearchAdvisory","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tencent":{"description":"advisory.Tencent","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Thales":{"description":"advisory.Thales","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TheMissingLink":{"description":"advisory.TheMissingLink","properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThermoFisher":{"description":"advisory.ThermoFisher","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThreatActorWithExternalObjects":{"description":"advisory.ThreatActorWithExternalObjects","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"country":{"type":"string"},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"misp_id":{"type":"string"},"misp_threat_actor":{"$ref":"#/components/schemas/advisory.MISPValueNoID"},"mitre_attack_group":{"$ref":"#/components/schemas/advisory.MITREAttackGroupNoID"},"mitre_group_cti":{"$ref":"#/components/schemas/advisory.MitreGroupCTI"},"mitre_id":{"type":"string"},"threat_actor_name":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false},"vendor_names_for_threat_actors":{"items":{"$ref":"#/components/schemas/advisory.VendorNameForThreatActor"},"type":"array","uniqueItems":false},"vendors_and_products_targeted":{"items":{"$ref":"#/components/schemas/advisory.VendorProduct"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ThreatData":{"description":"advisory.ThreatData","properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Tibco":{"description":"advisory.Tibco","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"overview":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Timeline":{"description":"advisory.Timeline","properties":{"lang":{"type":"string"},"time":{"description":"FIXME: flip to time","type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Tool":{"description":"advisory.Tool","properties":{"name":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.ToolRef"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ToolRef":{"description":"advisory.ToolRef","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tracking":{"description":"advisory.Tracking","properties":{"current_release_date":{"type":"string"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/components/schemas/advisory.RevisionHistory"},"type":"array","uniqueItems":false},"status":{"type":"string"},"version":{"description":"should match last 'number' in []RevisionHistory","type":"string"}},"type":"object"},"advisory.TrackingID":{"description":"advisory.TrackingID","properties":{"system_name":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.TraneTechnology":{"description":"advisory.TraneTechnology","properties":{"brand":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TrendMicro":{"description":"advisory.TrendMicro","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"scores":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TriageNotes":{"description":"advisory.TriageNotes","properties":{"references":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Trustwave":{"description":"advisory.Trustwave","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USD":{"description":"advisory.USD","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USOMAdvisory":{"description":"advisory.USOMAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"effect_tr":{"type":"string"},"general_information_tr":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_tr":{"type":"string"},"title_tr":{"type":"string"},"trid":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ubiquiti":{"description":"advisory.Ubiquiti","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"links":{"items":{"type":"string"},"type":"array","uniqueItems":false},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.UbuntuCVE":{"description":"advisory.UbuntuCVE","properties":{"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.AffectedUbuntuPackage"},"type":"array","uniqueItems":false},"cve":{"description":"Candidate","items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"PublicDate","type":"string"},"reference_urls":{"description":"References","items":{"type":"string"},"type":"array","uniqueItems":false},"source_url":{"type":"string"},"status":{"description":"active || retired","type":"string"},"ubuntu_url":{"type":"string"},"usn":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.UbuntuPackageReleaseStatus":{"description":"advisory.UbuntuPackageReleaseStatus","properties":{"affected":{"type":"boolean"},"fixed":{"type":"boolean"},"fixed_version":{"type":"string"},"lts":{"type":"boolean"},"release":{"type":"string"},"release_long":{"type":"string"},"release_version":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.Unify":{"description":"advisory.Unify","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Unisoc":{"description":"advisory.Unisoc","properties":{"access_vector":{"type":"string"},"affected_chipsets":{"type":"string"},"affected_software":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"rating":{"type":"string"},"score":{"type":"string"},"severity":{"type":"string"},"technology":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Update":{"description":"advisory.Update","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/components/schemas/advisory.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.Package"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.Reference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/components/schemas/advisory.DateTime"}},"type":"object"},"advisory.Updated":{"description":"advisory.Updated","type":"object"},"advisory.V3AcceptanceLevel":{"description":"advisory.V3AcceptanceLevel","properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.VCCPEDictionary":{"description":"advisory.VCCPEDictionary","properties":{"baseCPE":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.VCVulnerableCPEs":{"description":"advisory.VCVulnerableCPEs","properties":{"cve":{"type":"string"},"unrolled":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.VDEAdvisory":{"description":"advisory.VDEAdvisory","properties":{"csaf_json":{"$ref":"#/components/schemas/advisory.CSAF"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"type":"string"}},"type":"object"},"advisory.VLC":{"description":"advisory.VLC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VMWareAdvisory":{"description":"advisory.VMWareAdvisory","properties":{"AdvisoryID":{"type":"string"},"AdvisoryURL":{"type":"string"},"CVSSv3Range":{"type":"string"},"IssueDate":{"type":"string"},"Severity":{"type":"string"},"Synopsis":{"type":"string"},"UpdatedOn":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.VYAIREAdvisory":{"description":"advisory.VYAIREAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VanDyke":{"description":"advisory.VanDyke","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VapidLabsAdvisory":{"description":"advisory.VapidLabsAdvisory","properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"exploit":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"vapidId":{"type":"string"},"vendor":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Veeam":{"description":"advisory.Veeam","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VendorNameForThreatActor":{"description":"advisory.VendorNameForThreatActor","properties":{"threat_actor_name":{"type":"string"},"url":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.VendorProduct":{"description":"advisory.VendorProduct","properties":{"product":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.VendorRef":{"description":"advisory.VendorRef","properties":{"vendor_ref":{"type":"string"},"vendor_ref_url":{"type":"string"}},"type":"object"},"advisory.Veritas":{"description":"advisory.Veritas","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Virtuozzo":{"description":"advisory.Virtuozzo","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VoidSec":{"description":"advisory.VoidSec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheck":{"description":"advisory.VulnCheck","properties":{"affecting":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credit":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cvss_v3_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckCVEListV5":{"description":"advisory.VulnCheckCVEListV5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckConfig":{"description":"advisory.VulnCheckConfig","properties":{"config":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"}},"type":"object"},"advisory.VulnCheckKEV":{"description":"advisory.VulnCheckKEV","properties":{"_timestamp":{"type":"string"},"cisa_date_added":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"product":{"type":"string"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"required_action":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulncheck_reported_exploitation":{"items":{"$ref":"#/components/schemas/advisory.ReportedExploit"},"type":"array","uniqueItems":false},"vulncheck_xdb":{"items":{"$ref":"#/components/schemas/advisory.XDB"},"type":"array","uniqueItems":false},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.VulnCheckPackage":{"description":"advisory.VulnCheckPackage","properties":{"arch":{"type":"string"},"distro":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnerableDebianPackage":{"description":"advisory.VulnerableDebianPackage","properties":{"associated_cves":{"items":{"$ref":"#/components/schemas/advisory.DebianCVE"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package_name":{"type":"string"}},"type":"object"},"advisory.VulnerableProduct":{"description":"advisory.VulnerableProduct","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnrichment":{"description":"advisory.Vulnrichment","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.VulnrichmentCVERef"},"url":{"type":"string"}},"type":"object"},"advisory.VulnrichmentCVERef":{"description":"advisory.VulnrichmentCVERef","properties":{"containers":{"$ref":"#/components/schemas/advisory.VulnrichmentContainers"},"cveMetadata":{"$ref":"#/components/schemas/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.VulnrichmentContainers":{"description":"advisory.VulnrichmentContainers","properties":{"adp":{"items":{"$ref":"#/components/schemas/advisory.ADP"},"type":"array","uniqueItems":false},"cna":{"$ref":"#/components/schemas/advisory.MCna"}},"type":"object"},"advisory.VulnrichmentContent":{"description":"advisory.VulnrichmentContent","properties":{"id":{"type":"string"},"options":{"items":{"$ref":"#/components/schemas/advisory.VulnrichmentOption"},"type":"array","uniqueItems":false},"role":{"type":"string"},"timestamp":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnrichmentMetric":{"description":"advisory.VulnrichmentMetric","properties":{"other":{"$ref":"#/components/schemas/advisory.VulnrichmentOther"}},"type":"object"},"advisory.VulnrichmentOption":{"description":"advisory.VulnrichmentOption","properties":{"Automatable":{"type":"string"},"Exploitation":{"type":"string"},"Technical Impact":{"type":"string"}},"type":"object"},"advisory.VulnrichmentOther":{"description":"advisory.VulnrichmentOther","properties":{"content":{"$ref":"#/components/schemas/advisory.VulnrichmentContent"},"type":{"type":"string"}},"type":"object"},"advisory.WRT":{"description":"advisory.WRT","properties":{"advisory":{"type":"string"},"affectedVersions":{"type":"string"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"requirements":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WatchGuard":{"description":"advisory.WatchGuard","properties":{"advisory_id":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"resolution":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WhatsApp":{"description":"advisory.WhatsApp","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wibu":{"description":"advisory.Wibu","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wireshark":{"description":"advisory.Wireshark","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WithSecure":{"description":"advisory.WithSecure","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WolfSSL":{"description":"advisory.WolfSSL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Wolfi":{"description":"advisory.Wolfi","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.WolfiPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.WolfiPackage":{"description":"advisory.WolfiPackage","properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.WolfiSecFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.WolfiSecFix":{"description":"advisory.WolfiSecFix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"}},"type":"object"},"advisory.Wordfence":{"description":"advisory.Wordfence","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.XDB":{"description":"advisory.XDB","properties":{"clone_ssh_url":{"type":"string"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"xdb_id":{"type":"string"},"xdb_url":{"type":"string"}},"type":"object"},"advisory.Xen":{"description":"advisory.Xen","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updatedAt":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xerox":{"description":"advisory.Xerox","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xiaomi":{"description":"advisory.Xiaomi","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"internal_id":{"type":"string"},"summary":{"type":"string"},"summary_cn":{"type":"string"},"title":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xylem":{"description":"advisory.Xylem","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"xsa":{"type":"string"}},"type":"object"},"advisory.Yamaha":{"description":"advisory.Yamaha","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.YokogawaAdvisory":{"description":"advisory.YokogawaAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"ysar_id":{"type":"string"}},"type":"object"},"advisory.Yubico":{"description":"advisory.Yubico","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZDI":{"description":"advisory.ZDI","properties":{"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"string"},"discoverers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"filter_ids_dv":{"items":{"type":"string"},"type":"array","uniqueItems":false},"last_updated_at":{"type":"string"},"products":{"items":{"$ref":"#/components/schemas/advisory.ZDIProduct"},"type":"array","uniqueItems":false},"public_advisory":{"type":"string"},"published_date":{"type":"string"},"responses":{"items":{"$ref":"#/components/schemas/advisory.ZDIResponse"},"type":"array","uniqueItems":false},"title":{"type":"string"},"zdi_can":{"type":"string"},"zdi_public":{"type":"string"}},"type":"object"},"advisory.ZDIProduct":{"description":"advisory.ZDIProduct","properties":{"name":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/components/schemas/advisory.ZDIVendor"}},"type":"object"},"advisory.ZDIResponse":{"description":"advisory.ZDIResponse","properties":{"text":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/components/schemas/advisory.ZDIResponseVendor"}},"type":"object"},"advisory.ZDIResponseVendor":{"description":"advisory.ZDIResponseVendor","properties":{"name":{"type":"string"}},"type":"object"},"advisory.ZDIVendor":{"description":"advisory.ZDIVendor","properties":{"name":{"type":"string"},"uri":{"type":"string"}},"type":"object"},"advisory.Zebra":{"description":"advisory.Zebra","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZeroDayAdvisory":{"description":"advisory.ZeroDayAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zdi":{"$ref":"#/components/schemas/advisory.ZDI"}},"type":"object"},"advisory.ZeroScienceAdvisory":{"description":"advisory.ZeroScienceAdvisory","properties":{"advisoryId":{"type":"string"},"affectedVersions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"poC":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Zimbra":{"description":"advisory.Zimbra","properties":{"bugs":{"items":{"type":"integer"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"fix":{"type":"string"},"rating":{"type":"string"},"reporter":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Zoom":{"description":"advisory.Zoom","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"zsb":{"type":"string"}},"type":"object"},"advisory.Zscaler":{"description":"advisory.Zscaler","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZuluVersion":{"description":"advisory.ZuluVersion","properties":{"jdk":{"type":"string"},"type":{"type":"string"},"zulu":{"type":"string"}},"type":"object"},"advisory.Zuso":{"description":"advisory.Zuso","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zaid":{"type":"string"}},"type":"object"},"advisory.Zyxel":{"description":"advisory.Zyxel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.BaseMetricV2":{"description":"api.BaseMetricV2","properties":{"acInsufInfo":{"type":"boolean"},"cvssV2":{"$ref":"#/components/schemas/api.CVSSV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"severity":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.BaseMetricV3":{"description":"api.BaseMetricV3","properties":{"cvssV3":{"$ref":"#/components/schemas/api.CVSSV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"}},"type":"object"},"api.CPE":{"description":"api.CPE","properties":{"edition":{"type":"string"},"language":{"type":"string"},"other":{"type":"string"},"part":{"type":"string"},"product":{"type":"string"},"sw_edition":{"type":"string"},"target_hw":{"type":"string"},"target_sw":{"type":"string"},"update":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CPEMatch":{"description":"api.CPEMatch","properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"cpe_name":{"items":{"$ref":"#/components/schemas/api.CPEName"},"type":"array","uniqueItems":false},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"api.CPEName":{"description":"api.CPEName","properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"lastModifiedDate":{"type":"string"}},"type":"object"},"api.CVE":{"description":"api.CVE","properties":{"CVE_data_meta":{"$ref":"#/components/schemas/api.CVEDataMeta"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/components/schemas/api.Description"},"problemtype":{"$ref":"#/components/schemas/api.ProblemType"},"references":{"$ref":"#/components/schemas/api.References"}},"type":"object"},"api.CVEDataMeta":{"description":"api.CVEDataMeta","properties":{"ASSIGNER":{"type":"string"},"ID":{"type":"string"}},"type":"object"},"api.CVEDataMetaExtended":{"description":"api.CVEDataMetaExtended","properties":{"ALIAS":{"type":"string"},"ASSIGNER":{"type":"string"},"ID":{"type":"string"},"STATUS":{"type":"string"}},"type":"object"},"api.CVEExtended":{"description":"api.CVEExtended","properties":{"CVE_data_meta":{"$ref":"#/components/schemas/api.CVEDataMetaExtended"},"categorization":{"$ref":"#/components/schemas/api.CategorizationExtended"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/components/schemas/api.Description"},"problemtype":{"$ref":"#/components/schemas/api.ProblemTypeExtended"},"references":{"$ref":"#/components/schemas/api.ReferencesExtended"}},"type":"object"},"api.CVSSV2":{"description":"api.CVSSV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CVSSV3":{"description":"api.CVSSV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CWE":{"description":"api.CWE","properties":{"abstraction":{"type":"string"},"description":{"type":"string"},"kev_count":{"type":"integer"},"status":{"type":"string"},"structure":{"type":"string"},"vulncheck_nvd_count":{"type":"integer"},"weakness_id":{"type":"string"},"weakness_name":{"type":"string"},"weighted_score":{"type":"number"}},"type":"object"},"api.CategorizationExtended":{"description":"api.CategorizationExtended","properties":{"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.ClientFingerprints":{"description":"api.ClientFingerprints","properties":{"hassh":{"type":"string"},"ja3":{"type":"string"},"ja4":{"type":"string"}},"type":"object"},"api.Configurations":{"description":"api.Configurations","properties":{"CVE_data_version":{"type":"string"},"nodes":{"items":{"$ref":"#/components/schemas/api.Nodes"},"type":"array","uniqueItems":false}},"type":"object"},"api.CveItems":{"description":"api.CveItems","properties":{"configurations":{"$ref":"#/components/schemas/api.Configurations"},"cve":{"$ref":"#/components/schemas/api.CVE"},"impact":{"$ref":"#/components/schemas/api.Impact"},"lastModifiedDate":{"type":"string"},"publishedDate":{"type":"string"},"vcConfigurations":{"$ref":"#/components/schemas/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.CveItemsExtended":{"description":"api.CveItemsExtended","properties":{"_timestamp":{"type":"string"},"configurations":{"$ref":"#/components/schemas/api.Configurations"},"cve":{"$ref":"#/components/schemas/api.CVEExtended"},"date_added":{"type":"string"},"documentGenerationDate":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"impact":{"$ref":"#/components/schemas/api.ImpactExtended"},"lastModifiedDate":{"type":"string"},"mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/api.MitreAttackTech"},"type":"array","uniqueItems":false},"publishedDate":{"type":"string"},"related_attack_patterns":{"items":{"$ref":"#/components/schemas/api.RelatedAttackPattern"},"type":"array","uniqueItems":false},"vcConfigurations":{"$ref":"#/components/schemas/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vulnerable_cpes":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.DateTime":{"description":"api.DateTime","type":"object"},"api.Description":{"description":"api.Description","properties":{"description_data":{"items":{"$ref":"#/components/schemas/api.DescriptionData"},"type":"array","uniqueItems":false}},"type":"object"},"api.DescriptionData":{"description":"api.DescriptionData","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.EPSS":{"description":"exclude EPSS from changelog","properties":{"epss_percentile":{"type":"number"},"epss_score":{"type":"number"},"last_modified":{"type":"string"}},"type":"object"},"api.EPSSData":{"description":"api.EPSSData","properties":{"_timestamp":{"type":"string"},"cve":{"type":"string"},"epss_percentile":{"type":"number"},"epss_score":{"type":"number"}},"type":"object"},"api.ExploitChain":{"description":"api.ExploitChain","properties":{"cves":{"items":{"$ref":"#/components/schemas/api.ExploitChainCVE"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.ExploitChainCVE":{"description":"api.ExploitChainCVE","properties":{"cve":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ExploitV3Result":{"description":"api.ExploitV3Result","properties":{"_timestamp":{"description":"ignore this field when checking for differences/changes","type":"string"},"commercial_exploit_found":{"type":"boolean"},"counts":{"$ref":"#/components/schemas/api.ExploitsV3Count"},"date_added":{"type":"string"},"epss":{"$ref":"#/components/schemas/api.EPSS"},"exploits":{"items":{"$ref":"#/components/schemas/api.NormalizedExploitV3Entry"},"type":"array","uniqueItems":false},"id":{"type":"string"},"inKEV":{"type":"boolean"},"inVCKEV":{"type":"boolean"},"max_exploit_maturity":{"type":"string"},"public_exploit_found":{"type":"boolean"},"reported_exploitation":{"items":{"$ref":"#/components/schemas/api.NormalizedReportV3Entry"},"type":"array","uniqueItems":false},"reported_exploited":{"type":"boolean"},"reported_exploited_by_botnets":{"type":"boolean"},"reported_exploited_by_honeypot_service":{"type":"boolean"},"reported_exploited_by_ransomware":{"type":"boolean"},"reported_exploited_by_threat_actors":{"type":"boolean"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"timeline":{"$ref":"#/components/schemas/api.ExploitsV3Timeline"},"trending":{"$ref":"#/components/schemas/api.ExploitsTrending"},"weaponized_exploit_found":{"type":"boolean"}},"type":"object"},"api.ExploitsChange":{"description":"api.ExploitsChange","properties":{"change_time":{"type":"string"},"change_type":{"type":"string"},"field":{"type":"string"},"new_value":{},"old_value":{}},"type":"object"},"api.ExploitsChangelog":{"description":"api.ExploitsChangelog","properties":{"changes":{"items":{"$ref":"#/components/schemas/api.ExploitsChange"},"type":"array","uniqueItems":false},"cve":{"type":"string"}},"type":"object"},"api.ExploitsTrending":{"description":"api.ExploitsTrending","properties":{"github":{"type":"boolean"}},"type":"object"},"api.ExploitsV3Count":{"description":"api.ExploitsV3Count","properties":{"botnets":{"type":"integer"},"exploits":{"type":"integer"},"ransomware_families":{"type":"integer"},"threat_actors":{"type":"integer"}},"type":"object"},"api.ExploitsV3Timeline":{"description":"api.ExploitsV3Timeline","properties":{"cisa_kev_date_added":{"type":"string"},"cisa_kev_date_due":{"type":"string"},"first_exploit_published":{"type":"string"},"first_exploit_published_weaponized_or_higher":{"type":"string"},"first_reported_botnet":{"type":"string"},"first_reported_ransomware":{"type":"string"},"first_reported_threat_actor":{"type":"string"},"most_recent_exploit_published":{"type":"string"},"most_recent_reported_botnet":{"type":"string"},"most_recent_reported_ransomware":{"type":"string"},"most_recent_reported_threat_actor":{"type":"string"},"nvd_last_modified":{"description":"it's often the case the nvd record was updated, but in a way that is irrelevant to the contents\nof a vc exploits record.","type":"string"},"nvd_published":{"type":"string"},"vulncheck_kev_date_added":{"type":"string"},"vulncheck_kev_date_due":{"type":"string"}},"type":"object"},"api.HTTPDetails":{"description":"api.HTTPDetails","properties":{"http_request_body":{"type":"string"},"http_user_agent":{"type":"string"},"method":{"type":"string"},"protocol":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.Impact":{"description":"api.Impact","properties":{"baseMetricV2":{"$ref":"#/components/schemas/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"metricV40":{"$ref":"#/components/schemas/advisory.CVSSV40"}},"type":"object"},"api.ImpactExtended":{"description":"api.ImpactExtended","properties":{"baseMetricV2":{"$ref":"#/components/schemas/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"correctedBaseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"epss":{"$ref":"#/components/schemas/api.EPSS"},"metricV40":{"$ref":"#/components/schemas/advisory.CVSSV40"},"ssvc":{"items":{"$ref":"#/components/schemas/api.SSVC"},"type":"array","uniqueItems":false},"temporalMetricV2":{"$ref":"#/components/schemas/api.TemporalMetricV2"},"temporalMetricV3":{"$ref":"#/components/schemas/api.TemporalMetricV3"},"temporalV3Corrected":{"$ref":"#/components/schemas/api.TemporalMetricV3"},"threatMetricV40":{"$ref":"#/components/schemas/advisory.CVSSV40Threat"}},"type":"object"},"api.InitialAccess":{"description":"api.InitialAccess","properties":{"artifacts":{"description":"Artifacts holds the set of available artifacts for this vulnerability, such as exploit, shodan queries, PCAP traces, and others.","items":{"$ref":"#/components/schemas/api.InitialAccessArtifact"},"type":"array","uniqueItems":false},"cve":{"description":"CVE identifier for the given initial access record.","type":"string"},"inKEV":{"description":"InKEV is true if this artifact is in CISA's Known Exploited Vulnerabilities (KEV) data set; otherwise, false.","type":"boolean"},"inVCKEV":{"description":"InVCKEV is true if this artifact is in VulnCheck's Known Exploited Vulnerabilities (VCKEV) data set; otherwise, false.","type":"boolean"},"vulnerable_cpes":{"description":"VulnerableCPEs is the list of vulnerable CPE strings associated with this CVE and artifact(s).","items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.InitialAccessArtifact":{"description":"api.InitialAccessArtifact","properties":{"artifactName":{"description":"ArtifactName is a title to associate with this artifact.","type":"string"},"artifactsURL":{"description":"ArtifactsURL are URLs to the available artifact.","items":{"type":"string"},"type":"array","uniqueItems":false},"baiduQueries":{"description":"...","items":{"type":"string"},"type":"array","uniqueItems":false},"baiduRawQueries":{"description":"...","items":{"type":"string"},"type":"array","uniqueItems":false},"censysLegacyQueries":{"description":"CensysLegacyQueries are legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysLegacyRawQueries":{"description":"CensysLegacyRawQueries are raw legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysQueries":{"description":"CensysQueries are queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysRawQueries":{"description":"CensysRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array","uniqueItems":false},"chain":{"description":"Chain can represent the chain of exploitation.","items":{"type":"string"},"type":"array","uniqueItems":false},"cloneSSHURL":{"description":"CloneSSHURL is the git URL to clone the artifact with.","type":"string"},"dateAdded":{"description":"DateAdded is when this artifact entry was first added to the InitialAccess data set.","type":"string"},"driftnetQueries":{"description":"DriftnetQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array","uniqueItems":false},"driftnetRawQueries":{"description":"DriftnetRawQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array","uniqueItems":false},"exploit":{"description":"Exploit indicates whether or not an exploit is available in this artifact.","type":"boolean"},"fofaQueries":{"description":"FOFAQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with FOFA.","items":{"type":"string"},"type":"array","uniqueItems":false},"fofaRawQueries":{"items":{"type":"string"},"type":"array","uniqueItems":false},"googleQueries":{"description":"google queries","items":{"type":"string"},"type":"array","uniqueItems":false},"googleRawQueries":{"description":"raw google queries","items":{"type":"string"},"type":"array","uniqueItems":false},"greynoiseQueries":{"description":"GreynoiseQueries are queries for finding the vulnerability via honeypot data.","items":{"type":"string"},"type":"array","uniqueItems":false},"mitreAttackTechniques":{"description":"MITRE ATT\u0026CK techniques","items":{"type":"string"},"type":"array","uniqueItems":false},"nmapScript":{"description":"NmapScript indicates whether or not an nmap script for scanning environment exists in this artifact.","type":"boolean"},"pcap":{"description":"PCAP indicates whether of not a package capture of the exploit PoC exploiting a vulnerable system exists in this artifact.","type":"boolean"},"product":{"description":"Product are the software that has the vulnerability.","items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"description":"Related is a set of related cves.","items":{"type":"string"},"type":"array","uniqueItems":false},"shodanQueries":{"description":"ShodanQueries are queries for examining potential Internet-exposed devices \u0026 applications with Shodan in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"shodanRawQueries":{"description":"ShodanRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Shodan.","items":{"type":"string"},"type":"array","uniqueItems":false},"sigmaRule":{"description":"SigmaRule indicates whether or not a Sigma rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"snortRule":{"description":"SnortRule indicates whether or not a Snort rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"suricataRule":{"description":"SuricataRule indicates whether or not a Suricata rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"targetDocker":{"description":"TargetDocker indicates whether or not there is an available docker image with the vulnerability.","type":"boolean"},"targetEncryptedComms":{"description":"Encrypted communications?","type":"string"},"targetService":{"description":"TargetService indicates the service (HTTP, FTP, etc) that this exploit targets.","type":"string"},"vendor":{"description":"Vendor of the vulnerable product","type":"string"},"versionScanner":{"description":"VersionScanner indicates whether or not the exploit PoC can determine if target system is vulnerable without sending exploit payload in this artifact.","type":"boolean"},"yara":{"description":"YARA indicates whether or not a YARA rule designed to detect the exploit on an endpoint exists in this artifact.","type":"boolean"},"zeroday":{"description":"Zeroday indicates whether or not it is a VulnCheck zeroday.","type":"boolean"},"zoomEyeQueries":{"description":"ZoomEyeQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with ZoomEye.","items":{"type":"string"},"type":"array","uniqueItems":false},"zoomEyeRawQueries":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.MitreAttackTech":{"description":"api.MitreAttackTech","properties":{"d3fendmapping":{"items":{"$ref":"#/components/schemas/api.MitreMitigation2D3fendMapping"},"type":"array","uniqueItems":false},"detections":{"items":{"$ref":"#/components/schemas/api.MitreDetectionTech"},"type":"array","uniqueItems":false},"domain":{"type":"string"},"id":{"type":"string"},"mitigations":{"items":{"$ref":"#/components/schemas/api.MitreMitigationTech"},"type":"array","uniqueItems":false},"name":{"type":"string"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.MitreAttackToCVE":{"description":"api.MitreAttackToCVE","properties":{"cve_list":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"technique_id":{"$ref":"#/components/schemas/api.MitreAttackTech"}},"type":"object"},"api.MitreD3fendTechnique":{"description":"api.MitreD3fendTechnique","properties":{"id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.MitreDetectionTech":{"description":"api.MitreDetectionTech","properties":{"datacomponent":{"type":"string"},"datasource":{"type":"string"},"detects":{"type":"string"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigation2D3fendMapping":{"description":"api.MitreMitigation2D3fendMapping","properties":{"d3fendtechniques":{"items":{"$ref":"#/components/schemas/api.MitreD3fendTechnique"},"type":"array","uniqueItems":false},"id":{"type":"string"}},"type":"object"},"api.MitreMitigationTech":{"description":"api.MitreMitigationTech","properties":{"description":{"type":"string"},"id":{"type":"string"},"mitigation_url":{"type":"string"}},"type":"object"},"api.NVD20CPEMatch":{"description":"api.NVD20CPEMatch","properties":{"cpeLastModified":{"type":"string"},"created":{"type":"string"},"criteria":{"type":"string"},"lastModified":{"type":"string"},"matchCriteriaId":{"type":"string"},"matches":{"items":{"$ref":"#/components/schemas/api.NVD20CPEName"},"type":"array","uniqueItems":false},"status":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"}},"type":"object"},"api.NVD20CPEName":{"description":"api.NVD20CPEName","properties":{"cpeName":{"type":"string"},"cpeNameId":{"type":"string"}},"type":"object"},"api.NVD20CVE":{"description":"api.NVD20CVE","properties":{"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"descriptions":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/components/schemas/api.NVD20Metric"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/api.NVD20Reference"},"type":"array","uniqueItems":false},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vendorComments":{"items":{"$ref":"#/components/schemas/api.NVD20VendorComment"},"type":"array","uniqueItems":false},"vulnStatus":{"type":"string"},"weaknesses":{"items":{"$ref":"#/components/schemas/api.NVD20Weakness"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20CVEExtended":{"description":"api.NVD20CVEExtended","properties":{"ALIAS":{"type":"string"},"STATUS":{"type":"string"},"_timestamp":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"categorization":{"$ref":"#/components/schemas/api.CategorizationExtended"},"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"descriptions":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"documentGenerationDate":{"type":"string"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/components/schemas/api.NVD20MetricExtended"},"mitreAttackTechniques":{"items":{"$ref":"#/components/schemas/api.MitreAttackTech"},"type":"array","uniqueItems":false},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/api.NVD20ReferenceExtended"},"type":"array","uniqueItems":false},"relatedAttackPatterns":{"items":{"$ref":"#/components/schemas/api.RelatedAttackPattern"},"type":"array","uniqueItems":false},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vendorComments":{"items":{"$ref":"#/components/schemas/api.NVD20VendorComment"},"type":"array","uniqueItems":false},"vulnStatus":{"type":"string"},"vulncheckKEVExploitAdd":{"type":"string"},"vulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"weaknesses":{"items":{"$ref":"#/components/schemas/api.NVD20WeaknessExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20CvssDataV2":{"description":"api.NVD20CvssDataV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssDataV3":{"description":"api.NVD20CvssDataV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"environmentalSeverity":{"type":"string"},"exploitCodeMaturity":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedAvailabilityImpact":{"type":"string"},"modifiedConfidentialityImpact":{"type":"string"},"modifiedIntegrityImpact":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedScope":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"privilegesRequired":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"scope":{"type":"string"},"temporalScore":{"type":"number"},"temporalSeverity":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV2":{"description":"api.NVD20CvssMetricV2","properties":{"acInsufInfo":{"type":"boolean"},"baseSeverity":{"type":"string"},"cvssData":{"$ref":"#/components/schemas/api.NVD20CvssDataV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"source":{"type":"string"},"type":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.NVD20CvssMetricV3":{"description":"api.NVD20CvssMetricV3","properties":{"cvssData":{"$ref":"#/components/schemas/api.NVD20CvssDataV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV40":{"description":"api.NVD20CvssMetricV40","properties":{"cvssData":{"$ref":"#/components/schemas/advisory.CVSSV40"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20Description":{"description":"api.NVD20Description","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20Metric":{"description":"api.NVD20Metric","properties":{"cvssMetricV2":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV2"},"type":"array","uniqueItems":false},"cvssMetricV30":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV31":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV40":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV40"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20MetricExtended":{"description":"api.NVD20MetricExtended","properties":{"cvssMetricV2":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV2"},"type":"array","uniqueItems":false},"cvssMetricV30":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV31":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV40":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV40"},"type":"array","uniqueItems":false},"epss":{"$ref":"#/components/schemas/api.EPSS"},"ssvc":{"items":{"$ref":"#/components/schemas/api.SSVC"},"type":"array","uniqueItems":false},"temporalCVSSV2":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV2"},"temporalCVSSV2Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV2"},"type":"array","uniqueItems":false},"temporalCVSSV30":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"temporalCVSSV30Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"type":"array","uniqueItems":false},"temporalCVSSV31":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"temporalCVSSV31Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"type":"array","uniqueItems":false},"threatCVSSV40":{"$ref":"#/components/schemas/api.NVD20ThreatCVSSV40"},"threatCVSSV40Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20ThreatCVSSV40"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20Reference":{"description":"api.NVD20Reference","properties":{"source":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.NVD20ReferenceExtended":{"description":"api.NVD20ReferenceExtended","properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"source":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.NVD20TemporalAssociatedBaseMetric":{"description":"api.NVD20TemporalAssociatedBaseMetric","properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV2":{"description":"api.NVD20TemporalCVSSV2","properties":{"associatedBaseMetricV2":{"$ref":"#/components/schemas/api.NVD20TemporalAssociatedBaseMetric"},"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV3":{"description":"api.NVD20TemporalCVSSV3","properties":{"associatedBaseMetricV3":{"$ref":"#/components/schemas/api.NVD20TemporalAssociatedBaseMetric"},"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20ThreatAssociatedBaseMetric":{"description":"api.NVD20ThreatAssociatedBaseMetric","properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20ThreatCVSSV40":{"description":"api.NVD20ThreatCVSSV40","properties":{"associatedBaseMetricV40":{"$ref":"#/components/schemas/api.NVD20ThreatAssociatedBaseMetric"},"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"api.NVD20VendorComment":{"description":"api.NVD20VendorComment","properties":{"comment":{"type":"string"},"lastModified":{"type":"string"},"organization":{"type":"string"}},"type":"object"},"api.NVD20Weakness":{"description":"api.NVD20Weakness","properties":{"description":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20WeaknessDescExtended":{"description":"api.NVD20WeaknessDescExtended","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20WeaknessExtended":{"description":"api.NVD20WeaknessExtended","properties":{"description":{"items":{"$ref":"#/components/schemas/api.NVD20WeaknessDescExtended"},"type":"array","uniqueItems":false},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.Nodes":{"description":"api.Nodes","properties":{"children":{"items":{"$ref":"#/components/schemas/api.Nodes"},"type":"array","uniqueItems":false},"cpe_match":{"items":{"$ref":"#/components/schemas/api.CPEMatch"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"api.NormalizedExploitV3Entry":{"description":"api.NormalizedExploitV3Entry","properties":{"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"date_added":{"type":"string"},"exploit_availability":{"type":"string"},"exploit_maturity":{"type":"string"},"exploit_type":{"type":"string"},"name":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.NormalizedReportV3Entry":{"description":"api.NormalizedReportV3Entry","properties":{"date_added":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackage":{"description":"api.OSSPackage","properties":{"artifacts":{"$ref":"#/components/schemas/api.OSSPackageArtifacts"},"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"licenses":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array","uniqueItems":false},"research_attributes":{"$ref":"#/components/schemas/api.OSSPackageResearchAttributes"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"api.OSSPackageArtifacts":{"description":"api.OSSPackageArtifacts","properties":{"binary":{"items":{"$ref":"#/components/schemas/api.OSSPackageDownloadInfo"},"type":"array","uniqueItems":false},"source":{"items":{"$ref":"#/components/schemas/api.OSSPackageDownloadInfo"},"type":"array","uniqueItems":false}},"type":"object"},"api.OSSPackageDownloadInfo":{"description":"api.OSSPackageDownloadInfo","properties":{"hashes":{"items":{"$ref":"#/components/schemas/api.OSSPackageHashInfo"},"type":"array","uniqueItems":false},"reference":{"type":"string"},"type":{"description":"See OSSPackageDownloadInfoType* consts","type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackageHashInfo":{"description":"api.OSSPackageHashInfo","properties":{"algorithm":{"description":"See OSSPackageHashInfoAlgo* consts","type":"string"},"type":{"description":"See OSSPackageHashInfoType* consts","type":"string"},"value":{"description":"hex string digest or link to hash","type":"string"}},"type":"object"},"api.OSSPackageResearchAttributes":{"description":"api.OSSPackageResearchAttributes","properties":{"abandoned":{"type":"boolean"},"eol":{"type":"boolean"},"is_malicious":{"type":"boolean"},"malicious_source":{"type":"string"},"repo_hijackable":{"type":"boolean"},"squatted_package":{"type":"string"}},"type":"object"},"api.OSSPackageVulnerability":{"description":"api.OSSPackageVulnerability","properties":{"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"api.Package":{"description":"api.Package","properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.ProblemType":{"description":"api.ProblemType","properties":{"problemtype_data":{"items":{"$ref":"#/components/schemas/api.ProblemTypeData"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeData":{"description":"api.ProblemTypeData","properties":{"description":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDescription"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeDataExtended":{"description":"api.ProblemTypeDataExtended","properties":{"description":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDescriptionExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeDescription":{"description":"api.ProblemTypeDescription","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeDescriptionExtended":{"description":"api.ProblemTypeDescriptionExtended","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeExtended":{"description":"api.ProblemTypeExtended","properties":{"problemtype_data":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDataExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.Reference":{"description":"api.Reference","properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ReferenceData":{"description":"api.ReferenceData","properties":{"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.ReferenceDataExtended":{"description":"api.ReferenceDataExtended","properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.References":{"description":"api.References","properties":{"reference_data":{"items":{"$ref":"#/components/schemas/api.ReferenceData"},"type":"array","uniqueItems":false}},"type":"object"},"api.ReferencesExtended":{"description":"api.ReferencesExtended","properties":{"reference_data":{"description":"ExploitData []NormalizedExploit `json:\"exploit_data,omitempty\"`\n\t\tThreatActorData []ThreatActorExtended `json:\"threat_actor_data,omitempty\"`\n\t\tRansomwareData []RansomwareReferenceData `json:\"ransomware_data,omitempty\"`\n\t\tAdvisoryData []AdvisoryExtended `json:\"advisory_data,omitempty\"`\n\t\tIdentifierData []IdentifierExtended `json:\"identifier_data,omitempty\"`","items":{"$ref":"#/components/schemas/api.ReferenceDataExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.RelatedAttackPattern":{"description":"api.RelatedAttackPattern","properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"api.SSVC":{"description":"api.SSVC","properties":{"automatable":{"type":"string"},"exploitation":{"type":"string"},"source":{"type":"string"},"technicalImpact":{"type":"string"}},"type":"object"},"api.TemporalCVSSV2":{"description":"api.TemporalCVSSV2","properties":{"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalCVSSV3":{"description":"api.TemporalCVSSV3","properties":{"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalMetricV2":{"description":"api.TemporalMetricV2","properties":{"cvssV2":{"$ref":"#/components/schemas/api.TemporalCVSSV2"}},"type":"object"},"api.TemporalMetricV3":{"description":"api.TemporalMetricV3","properties":{"cvssV3":{"$ref":"#/components/schemas/api.TemporalCVSSV3"}},"type":"object"},"api.Update":{"description":"api.Update","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/components/schemas/api.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/api.Package"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/api.Reference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/components/schemas/api.DateTime"}},"type":"object"},"api.VulnCheckCanary":{"description":"api.VulnCheckCanary","properties":{"category":{"type":"string"},"client_fingerprints":{"$ref":"#/components/schemas/api.ClientFingerprints"},"cve":{"type":"string"},"dst_country":{"type":"string"},"http":{"$ref":"#/components/schemas/api.HTTPDetails"},"payload":{"type":"string"},"severity":{"type":"integer"},"signature":{"type":"string"},"signature_id":{"type":"integer"},"src_country":{"type":"string"},"src_ip":{"type":"string"},"src_port":{"type":"integer"},"timestamp":{"type":"string"}},"type":"object"},"api.VulnerabilityAlias":{"description":"api.VulnerabilityAlias","properties":{"alias":{"type":"string"},"cve":{"type":"string"},"reference_url":{"type":"string"}},"type":"object"},"backup.BackupResponse":{"description":"backup.BackupResponse","properties":{"available":{"type":"boolean"},"feed":{"type":"string"},"url":{"type":"string"},"url_direct":{"type":"string"},"url_expires":{"type":"string"}},"type":"object"},"backup.FeedItem":{"description":"backup.FeedItem","properties":{"available":{"type":"boolean"},"backup_written_at":{"type":"string"},"href":{"type":"string"},"name":{"type":"string"}},"type":"object"},"backup.ListBackupsResponse":{"description":"backup.ListBackupsResponse","properties":{"data":{"items":{"$ref":"#/components/schemas/backup.FeedItem"},"type":"array","uniqueItems":false}},"type":"object"},"models.Entitlements":{"description":"models.Entitlements","properties":{"entitlements":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Entitlements provides a map of roles to a list of entitlements","type":"object"}},"type":"object"},"paginate.Match":{"description":"paginate.Match","properties":{"field":{"type":"string"},"value":{"type":"string"}},"type":"object"},"paginate.Pagination":{"description":"paginate.Pagination","properties":{"cursor":{"description":"Cursor for the current page","type":"string"},"first_item":{"description":"First and last Item","type":"integer"},"index":{"description":"The requested index","type":"string"},"last_item":{"type":"integer"},"limit":{"description":"Per-Page limit","type":"integer"},"matches":{"items":{"$ref":"#/components/schemas/paginate.Match"},"type":"array","uniqueItems":false},"max_pages":{"type":"integer"},"next_cursor":{"description":"Cursor for the next page","type":"string"},"opensearch_query":{"type":"object"},"order":{"type":"string"},"page":{"description":"The current Page number","type":"integer"},"pages":{"items":{"type":"string"},"type":"array","uniqueItems":false},"parameters":{"items":{"$ref":"#/components/schemas/paginate.Param"},"type":"array","uniqueItems":false},"show_pages":{"type":"boolean"},"show_query":{"type":"boolean"},"sort":{"type":"string"},"timestamp":{"type":"string"},"total_documents":{"description":"The total number of items","type":"integer"},"total_pages":{"description":"The total number of pages","type":"integer"},"warnings":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"paginate.Param":{"description":"paginate.Param","properties":{"filtering":{"type":"string"},"format":{"type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexBackup":{"description":"params.IndexBackup","properties":{"date_added":{"type":"string"},"filename":{"type":"string"},"sha256":{"type":"string"},"url":{"type":"string"},"url_ap-southeast-2":{"type":"string"},"url_eu-west-2":{"type":"string"},"url_expires":{"type":"string"},"url_il-central-1":{"type":"string"},"url_me-central-1":{"type":"string"},"url_mrap":{"type":"string"},"url_ttl_minutes":{"type":"integer"},"url_us-east-1":{"type":"string"},"url_us-west-2":{"type":"string"}},"type":"object"},"params.IndexBackupList":{"description":"params.IndexBackupList","properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed backup information","type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexList":{"description":"params.IndexList","properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed index information","type":"string"},"name":{"type":"string"}},"type":"object"},"purl.BatchVulnFinding":{"description":"purl.BatchVulnFinding","properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array","uniqueItems":false},"purl":{"description":"the purl, ex. hex/coherence@0.1.2","type":"string"},"purl_struct":{"$ref":"#/components/schemas/purl.PackageURLJSON"},"research_attributes":{"$ref":"#/components/schemas/api.OSSPackageResearchAttributes"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"purl.PackageURLJSON":{"description":"meta-data about the purl","properties":{"name":{"type":"string"},"namespace":{"type":"string"},"qualifiers":{"items":{"$ref":"#/components/schemas/purl.QualifierJSON"},"type":"array","uniqueItems":false},"subpath":{"type":"string"},"type":{"type":"string"},"version":{"type":"string"}},"type":"object"},"purl.QualifierJSON":{"description":"purl.QualifierJSON","properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"purls.Artifact":{"description":"purls.Artifact","type":"object"},"purls.PurlResponse":{"description":"purls.PurlResponse","properties":{"artifacts":{"$ref":"#/components/schemas/purls.Artifact"},"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"licenses":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/purls.Vulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"purls.Vulnerability":{"description":"purls.Vulnerability","properties":{"arch":{"type":"string"},"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"render.Response-array_params_IndexBackupList":{"description":"render.Response-array_params_IndexBackupList","properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/components/schemas/params.IndexBackupList"},"type":"array","uniqueItems":false}},"type":"object"},"render.Response-array_params_IndexList":{"description":"render.Response-array_params_IndexList","properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/components/schemas/params.IndexList"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.A10"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ABBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AIX"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AMD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AMI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ASRG"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AVEVAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AVIDMLAdvs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AWS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Abbott"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Absolute"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Acronis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AdobeAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Advantech"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Advisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AdvisoryRecord"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlephResearch"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Alibaba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlmaLinuxUpdate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AmazonCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AnchoreNVDOverride"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AndroidAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheActiveMQ"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheArchiva"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheArrow"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCamel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCommons"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCouchDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheFlink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheGuacamole"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheHTTP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheHadoop"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheJSPWiki"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheKafka"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheLoggingServices"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheNiFi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOFBiz"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOpenMeetings"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOpenOffice"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApachePulsar"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheShiro"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSpark"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheStruts"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSubversion"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSuperset"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheTomcat"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheZooKeeper"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AppCheck"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Appgate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AppleAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ArchIssue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Arista"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Aruba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AssetNote"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Asterisk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Astra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Asus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AtlassianAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AtlassianVuln"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Atredis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Audiocodes"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AusCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Autodesk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Avaya"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Avigilon"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Axis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Azul"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BBraunAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BDUAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Bandr"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BaxterAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeckhoffAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeckmanCoulter"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BectonDickinsonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeldenAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeyondTrust"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Binarly"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BitDefender"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BlackBerry"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BoschAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BostonScientificAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Botnet"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CACyberCentreAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CBLMariner"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CERTEUAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CESA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CISAAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNNVDEntryJSON"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNVDBulletin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNVDFlaw"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CanvasExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CarestreamAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Carrier"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertBE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertFRAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertIN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertIRSecurityAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertSE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertUA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ChainGuard"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CheckPoint"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Chrome"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ciena"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CisaCsafAdv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoKnownGoodValue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CitrixAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ClarotyVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CloudBees"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CloudVulnDBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CodesysAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CommVault"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CompassSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ContainerOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CoreImpactExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Crestron"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CrowdSec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Curl"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Cvrf"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DFNCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DNN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dahua"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Danfoss"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dassault"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DebianSecurityAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DeltaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DistroPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Django"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DotCMS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DragosAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Draytek"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Drupal"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLAlibaba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLMicrosoft"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLReleaseData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EUVD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EatonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Elastic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Elspec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EmergingThreatsSnort"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EmersonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EndOfLife"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Endress"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ExodusIntel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ExploitDBExploitv2"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.F5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FSecure"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fanuc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fastly"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Festo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FileCloud"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FileZilla"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FlattSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ForgeRock"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FortinetAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FortinetIPS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Foxit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fresenius"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GCP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GEGas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GEHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GHAdvisoryJSONLean"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GHSA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GMOCyberSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gallagher"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gen"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GenericEOL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Genetec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gigabyte"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitHubExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitLabExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GiteeExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitlabAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Glibc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GnuTLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GoVulnJSON"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Grafana"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GreyNoiseDetection"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HCL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HIKVision"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HKCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HMS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HPE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Hacktivity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HarmonyOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HashiCorp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HaskellSADBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HillromAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Hitachi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HitachiEnergy"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Honeywell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Huawei"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HuaweiEulerOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HuaweiIPS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IAVA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IBM"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ITWExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Idemia"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Igel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IncibeAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Intel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IpIntelRecord"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IsraeliAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IsraeliVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Istio"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ivanti"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IvantiRSS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JFrog"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JNJAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JVN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JVNAdvisoryItem"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Jenkins"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JetBrains"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JohnsonControls"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Juniper"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.K8S"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KEVCatalogVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KRCertAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KasperskyICSCERTAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KoreLogic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Kunbus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LG"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Lantronix"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Lenovo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LexmarkAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LibreOffice"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Linux"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LolAdvs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MACert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MFiles"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MaliciousPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousVSCodeExts-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MaliciousVSCodeExts-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MaliciousVSCodeExts"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ManageEngineAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MbedTLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.McAfee"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mediatek"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MedtronicAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mendix"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetaAdvisories"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetaData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetasploitExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftCVRF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftDriverBlockList"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftKb"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mikrotik"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mindray"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MispValue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mitel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitreCVEListV5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitsubishiElectricAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MongoDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MoxaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MozillaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NCSC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NCSCCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NEC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NHS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NTP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NVD20Source"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NVDCPEDictionary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NZAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Naver"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nessus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NetApp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netatalk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netgate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netgear"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netskope"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nexpose"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NginxAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NodeJS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NodeSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nokia"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NotePadPlusPlus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nozomi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nuclei"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OSV"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OTRS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OctopusDeploy"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Okta"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Omron"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OneE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenBSD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenCVDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenJDK"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenSSH"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenSSLSecAdv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenStack"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Opengear"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OracleCPU"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OracleCPUCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OwnCloud"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PHPMyAdmin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PKCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PTC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PacketstormExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Palantir"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PaloAltoAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Panasonic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PaperCut"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Pega"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PhilipsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PhoenixContactAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PostgresSQL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PowerDNS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Progress"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Proofpoint"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PureStorage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PyPAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QNAPAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QQID"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QSB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Qualcomm"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Qualys"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QualysQID"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RansomwareExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RedLion"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RedhatCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Renesas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Revive"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RhelCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Roche"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Rockwell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RockyErrata"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Rsync"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ruckus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RustsecAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SAP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SECConsult"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SSDAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Safran"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SaintExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SalesForce"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Samba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sandisk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SansDshield"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SchneiderElectricAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Schutzwerk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SecurityBulletin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SecurityLab"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SeebugExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SentinelOne"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ServiceNow"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SevenZip"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ShadowServerExploitedVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Shielder"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sick"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SiemensAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SierraWireless"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SigmaRule"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SingCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sitecore"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Slackware"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SolarWindsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Solr"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sonatype"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SonicWallAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SpacelabsHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Splunk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Spring"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Stormshield"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.StrykerAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sudo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SuseSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SwisslogHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Symfony"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Synacktiv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SyncroSoft"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Synology"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Syss"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TPLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TWCertAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tailscale"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TalosAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TeamViewer"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TenableResearchAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tencent"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Thales"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TheMissingLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ThermoFisher"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ThreatActorWithExternalObjects"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tibco"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TraneTechnology"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TrendMicro"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Trustwave"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.USD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.USOMAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ubiquiti"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.UbuntuCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Unify"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Unisoc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Update"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VCCPEDictionary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VCVulnerableCPEs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VDEAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VLC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VMWareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VYAIREAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VanDyke"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VapidLabsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Veeam"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Veritas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Virtuozzo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VoidSec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheck"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckCVEListV5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckConfig"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckKEV"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnerableDebianPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Vulnrichment"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WRT"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WatchGuard"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WhatsApp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wibu"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wireshark"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WithSecure"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WolfSSL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wolfi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wordfence"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xen"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xerox"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xiaomi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xylem"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Yamaha"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.YokogawaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Yubico"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zebra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ZeroDayAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ZeroScienceAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zimbra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zoom"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zscaler"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zuso"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zyxel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CWE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CveItems"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CveItemsExtended"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.EPSSData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitChain"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitV3Result"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitsChangelog"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.InitialAccess"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.MitreAttackToCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CPEMatch"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CVEExtended"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.OSSPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_Update-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_Update-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.Update"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.VulnCheckCanary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.VulnerabilityAlias"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/purls.PurlResponse"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata":{"description":"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.ResponseMetadata"},"data":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.BackupResponseMetadata"},"data":{"items":{"$ref":"#/components/schemas/params.IndexBackup"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.PurlResponseMetadata"},"data":{"$ref":"#/components/schemas/v3controllers.PurlResponseData"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.PurlsResponseMetadata"},"data":{"items":{"$ref":"#/components/schemas/purl.BatchVulnFinding"},"type":"array","uniqueItems":false}},"type":"object"},"search.ErrorResponse":{"description":"search.ErrorResponse","properties":{"error":{"type":"boolean"},"errors":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"search.V4AdvisoryMeta":{"description":"search.V4AdvisoryMeta","properties":{"cursor":{"type":"string"},"filtered":{"type":"integer"},"limit":{"type":"integer"},"next_cursor":{"type":"string"},"page":{"type":"integer"},"pages":{"type":"integer"},"total":{"type":"integer"}},"type":"object"},"search.V4AdvisoryReturnValue":{"description":"search.V4AdvisoryReturnValue","properties":{"_meta":{"$ref":"#/components/schemas/search.V4AdvisoryMeta"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"type":"array","uniqueItems":false}},"type":"object"},"search.V4FeedItem":{"description":"search.V4FeedItem","properties":{"description":{"type":"string"},"href":{"type":"string"},"name":{"type":"string"}},"type":"object"},"search.V4ListFeedReturnValue":{"description":"search.V4ListFeedReturnValue","properties":{"data":{"items":{"$ref":"#/components/schemas/search.V4FeedItem"},"type":"array","uniqueItems":false}},"type":"object"},"v3controllers.BackupResponseMetadata":{"description":"v3controllers.BackupResponseMetadata","properties":{"index":{"type":"string"},"timestamp":{"type":"string"}},"type":"object"},"v3controllers.PurlResponseData":{"description":"v3controllers.PurlResponseData","properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array","uniqueItems":false},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"v3controllers.PurlResponseMetadata":{"description":"v3controllers.PurlResponseMetadata","properties":{"purl_struct":{"$ref":"#/components/schemas/purl.PackageURLJSON"},"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.PurlsResponseMetadata":{"description":"v3controllers.PurlsResponseMetadata","properties":{"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.ResponseMetadata":{"description":"v3controllers.ResponseMetadata","properties":{"cpe":{"type":"string"},"cpe_struct":{"$ref":"#/components/schemas/api.CPE"},"timestamp":{"type":"string"},"total_documents":{"type":"integer"}},"type":"object"}},"securitySchemes":{"Bearer":{"in":"header","name":"Authorization","type":"apiKey"}}},"externalDocs":{"description":"","url":""},"info":{"contact":{"email":"support@vulncheck.com","name":"VulnCheck API Support"},"description":"VulnCheck API (v3 + v4)","termsOfService":"https://vulncheck.com/terms","title":"VulnCheck API","version":"latest"},"openapi":"3.1.0","paths":{"/v3/backup":{"get":{"description":"Return a list of indexes with backup and endpoint links that the user has access to","operationId":"backup_get","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.Response-array_params_IndexBackupList"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"oneOf":[{"type":"string"},{"type":"string"}]}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return a list of indexes with backup and endpoint links","tags":["endpoints"]}},"/v3/backup/{index}":{"get":{"description":"Retrieve a list of VulnCheck backups by index","operationId":"backup_index_get","parameters":[{"description":"Name of an exploit, vulnerability, or advisory index","in":"path","name":"index","required":true,"schema":{"enum":["7zip","a10","abb","abbott","absolute","acronis","adobe","advantech","advisories","aix","aleph-research","alibaba-advs","alma","alpine","alpine-purls","amazon","amazon-cve","amd","ami","anchore-nvd-override","android","apache-activemq","apache-archiva","apache-arrow","apache-camel","apache-commons","apache-couchdb","apache-flink","apache-guacamole","apache-hadoop","apache-http","apache-jspwiki","apache-kafka","apache-loggingservices","apache-nifi","apache-ofbiz","apache-openmeetings","apache-openoffice","apache-pulsar","apache-shiro","apache-spark","apache-struts","apache-subversion","apache-superset","apache-tomcat","apache-zookeeper","appcheck","appgate","apple","arch","arista","aruba","asrg","assetnote","asterisk","astra","asus","atlassian","atlassian-vulns","atredis","audiocodes","auscert","autodesk","avaya","aveva","avidml-advs","avigilon","aws","axis","azul","bandr","baxter","bbraun","bd","bdu","beckhoff","beckman-coulter","belden","beyond-trust","binarly","bitdefender","blackberry","bls","bosch","boston-scientific","botnets","ca-cyber-centre","canvas","carestream","cargo","carrier","cbl-mariner","centos","cert-be","cert-in","cert-ir-security-alerts","cert-se","cert-ua","certeu","certfr","chainguard","checkpoint","chrome","ciena","cisa-alerts","cisa-csaf","cisa-kev","cisco","cisco-csaf","cisco-known-good-values","cisco-talos","citrix","claroty","cloudbees","cloudvulndb","cnnvd","cnvd-bulletins","cnvd-flaws","cocoapods","codesys","commvault","compass-security","composer","conan","coreimpact","cpe-vulnerable","crestron","crowdsec","curl","cwe","dahua","danfoss","dassault","debian","debian-dsa","debian-packages","debian-purls","dell","delta","dfn-cert","django","dlink","dnn","dotcms","dragos","draytek","drupal","eaton","elastic","elspec","emerging-threats-snort","emerson","endoflife","endress","eol","eol-alibaba","eol-microsoft","epss","euvd","exodus-intel","exploit-chains","exploitdb","exploits","exploits-changelog","f-secure","f5","fanuc","fastly","fedora","festo","filecloud","filezilla","flatt-security","forgerock","fortinet","fortinet-ips","foxit","freebsd","fresenius","gallagher","gcp","ge-gas","ge-healthcare","gem","gen","genetec","ghsa","gigabyte","gitee-exploits","github-exploits","github-security-advisories","gitlab-advisories-community","gitlab-exploits","glibc","gmo-cybersecurity","gnutls","go-vulndb","golang","google-0day-itw","google-container-optimized-os","grafana","greynoise-metadata","hackage","hacktivity","harmonyos","hashicorp","haskell-sadb","hcl","hex","hikvision","hillrom","hitachi","hitachi-energy","hkcert","hms","honeywell","hp","hpe","huawei-euleros","huawei-ips","huawei-psirt","iava","ibm","idemia","igel","il-alerts","il-vulnerabilities","incibe","initial-access","initial-access-git","intel","ipintel-10d","ipintel-30d","ipintel-3d","ipintel-90d","istio","ivanti","ivanti-rss","jenkins","jetbrains","jfrog","jnj","johnson-controls","juniper","jvn","jvndb","kaspersky-ics-cert","korelogic","krcert-security-notices","krcert-vulnerabilities","kubernetes","kunbus","lantronix","lenovo","lexmark","lg","libre-office","linux","lol-advs","m-files","macert","malicious-packages","malicious-vscode-exts","manageengine","maven","mbed-tls","mcafee","mediatek","medtronic","mendix","meta-advisories","metasploit","microsoft-csaf","microsoft-cvrf","microsoft-driver-block-list","microsoft-kb","mikrotik","mindray","misp-threat-actors","mitel","mitre-attack-cve","mitre-cvelist-v5","mitsubishi-electric","mongodb","moxa","mozilla","naver","ncsc","ncsc-cves","nec","nessus","netapp","netatalk","netgate","netgear","netskope","nexpose","nginx","nhs","ni","nist-nvd","nist-nvd2","nist-nvd2-cpematch","nist-nvd2-sources","node-security","nodejs","nokia","notepadplusplus","nozomi","npm","ntp","nuclei","nuget","nvd-cpe-dictionary","nvidia","nz-advisories","octopus-deploy","okta","omron","omron-eol","one-e","opam","open-cvdb","openbsd","opengear","openjdk","openssh","openssl-secadv","openstack","openwrt","oracle","oracle-cpu","oracle-cpu-csaf","osv","otrs","owncloud","packetstorm","palantir","palo-alto","panasonic","papercut","pega","philips","phoenix-contact","php-my-admin","pkcert","postgressql","powerdns","progress","proofpoint","ptc","pub","pure-storage","pypa-advisories","pypi","qnap","qqids","qualcomm","qualys","qualys-qids","qubes-qsb","ransomware","red-lion","redhat","redhat-cves","renesas","revive","roche","rockwell","rocky","rocky-errata","rocky-purls","rsync","ruckus","rustsec-advisories","sacert","safran","saint","salesforce","samba","sandisk","sans-dshield","sap","schneider-electric","schutzwerk","sec-consult","securitylab","seebug","sel","sentinelone","servicenow","shadowserver-exploited","shielder","sick","siemens","sierra-wireless","sigmahq-sigma-rules","singcert","sitecore","slackware","solarwinds","solr","sonatype","sonicwall","spacelabs-healthcare","splunk","spring","ssd","stormshield","stryker","sudo","suse","suse-security","swift","swisslog-healthcare","symfony","synacktiv","syncrosoft","synology","syss","tailscale","teamviewer","tenable-research-advisories","tencent","thales","themissinglink","thermo-fisher","threat-actors","ti","tibco","tp-link","trane-technology","trendmicro","trustwave","twcert","ubiquiti","ubuntu","ubuntu-purls","unify","unisoc","usd","usom","vandyke","vapidlabs","vc-cpe-dictionary","vde","veeam","veritas","virtuozzo","vlc","vmware","voidsec","vulncheck","vulncheck-canaries","vulncheck-canaries-10d","vulncheck-canaries-30d","vulncheck-canaries-3d","vulncheck-canaries-90d","vulncheck-config","vulncheck-cvelist-v5","vulncheck-kev","vulncheck-nvd","vulncheck-nvd2","vulnerability-aliases","vulnrichment","vyaire","watchguard","whatsapp","wibu","wireshark","with-secure","wolfi","wolfssl","wordfence","xen","xerox","xiaomi","xylem","yamaha","yokogawa","yubico","zdi","zebra","zebra-eol","zeroscience","zimbra","zoom","zscaler","zuso","zyxel"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve a list of backups by index","tags":["endpoints"]}},"/v3/cpe":{"get":{"description":"Based on the specified CPE (Common Platform Enumeration) URI string, this endpoint will return a list of vulnerabilities that are related to the package. We support v2.2 and v2.3","operationId":"cpe_get","parameters":[{"description":"CPE designation to lookup","in":"query","name":"cpe","required":true,"schema":{"type":"string"}},{"description":"Filter by vulnerability status (true/false). Defaults to false if not provided.","in":"query","name":"isVulnerable","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return CVE 's associated with a specific NIST CPE","tags":["endpoints"]}},"/v3/entitlements":{"get":{"description":"Retrieve entitlements for the current user","operationId":"entitlements_get","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/models.Entitlements"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve user entitlements","tags":["endpoints"]}},"/v3/index":{"get":{"description":"Return a list of available indexes with endpoint links that the user has access to","operationId":"index_get","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.Response-array_params_IndexList"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"oneOf":[{"type":"string"},{"type":"string"}]}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return a list of available indexes with endpoint links","tags":["endpoints"]}},"/v3/index/7zip":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the 7zip index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 7Zip Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/7zip?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/7zip?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_7zip_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"7zip\"","tags":["indices"]}},"/v3/index/a10":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the a10 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** A10 Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/a10?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/a10?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_a10_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"a10\"","tags":["indices"]}},"/v3/index/abb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ABB Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_abb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"abb\"","tags":["indices"]}},"/v3/index/abbott":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abbott index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Abbott Product Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abbott?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abbott?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_abbott_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"abbott\"","tags":["indices"]}},"/v3/index/absolute":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the absolute index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Absolute Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/absolute?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/absolute?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_absolute_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"absolute\"","tags":["indices"]}},"/v3/index/acronis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the acronis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Acronis Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/acronis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/acronis?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_acronis_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"acronis\"","tags":["indices"]}},"/v3/index/adobe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the adobe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Adobe Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/adobe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/adobe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_adobe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"adobe\"","tags":["indices"]}},"/v3/index/advantech":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advantech index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Advantech Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advantech?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advantech?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_advantech_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"advantech\"","tags":["indices"]}},"/v3/index/advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"advisories\"","tags":["indices"]}},"/v3/index/aix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AIX Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aix\"","tags":["indices"]}},"/v3/index/aleph-research":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aleph-research index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aleph Research Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aleph-research?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aleph-research?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aleph-research_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aleph-research\"","tags":["indices"]}},"/v3/index/alibaba-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alibaba-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alibaba-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alibaba-advs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alibaba-advs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alibaba-advs\"","tags":["indices"]}},"/v3/index/alma":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alma index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alma Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alma?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alma?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alma_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alma\"","tags":["indices"]}},"/v3/index/alpine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alpine_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alpine\"","tags":["indices"]}},"/v3/index/alpine-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alpine-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alpine-purls\"","tags":["indices"]}},"/v3/index/amazon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon Linux Security Center\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_amazon_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"amazon\"","tags":["indices"]}},"/v3/index/amazon-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon-cve?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_amazon-cve_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"amazon-cve\"","tags":["indices"]}},"/v3/index/amd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMD Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_amd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"amd\"","tags":["indices"]}},"/v3/index/ami":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ami index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMI Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ami?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ami?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ami_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ami\"","tags":["indices"]}},"/v3/index/anchore-nvd-override":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the anchore-nvd-override index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Anchore NVD Data Overrides\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/anchore-nvd-override?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/anchore-nvd-override?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_anchore-nvd-override_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"anchore-nvd-override\"","tags":["indices"]}},"/v3/index/android":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the android index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Android Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/android?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/android?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_android_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"android\"","tags":["indices"]}},"/v3/index/apache-activemq":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-activemq index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ActiveMQ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-activemq?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-activemq?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-activemq_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-activemq\"","tags":["indices"]}},"/v3/index/apache-archiva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-archiva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Archiva Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-archiva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-archiva?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-archiva_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-archiva\"","tags":["indices"]}},"/v3/index/apache-arrow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-arrow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Arrow Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-arrow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-arrow?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-arrow_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-arrow\"","tags":["indices"]}},"/v3/index/apache-camel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-camel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Camel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-camel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-camel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-camel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-camel\"","tags":["indices"]}},"/v3/index/apache-commons":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-commons index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Commons Known Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-commons?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-commons?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-commons_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-commons\"","tags":["indices"]}},"/v3/index/apache-couchdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-couchdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache CouchDB Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-couchdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-couchdb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-couchdb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-couchdb\"","tags":["indices"]}},"/v3/index/apache-flink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-flink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Flink Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-flink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-flink?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-flink_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-flink\"","tags":["indices"]}},"/v3/index/apache-guacamole":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-guacamole index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Guacamole Security Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-guacamole?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-guacamole?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-guacamole_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-guacamole\"","tags":["indices"]}},"/v3/index/apache-hadoop":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-hadoop index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Hadoop CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-hadoop?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-hadoop?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-hadoop_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-hadoop\"","tags":["indices"]}},"/v3/index/apache-http":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-http index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache HTTP Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-http?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-http?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-http_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-http\"","tags":["indices"]}},"/v3/index/apache-jspwiki":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-jspwiki index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache JSPWiki CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-jspwiki?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-jspwiki?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-jspwiki_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-jspwiki\"","tags":["indices"]}},"/v3/index/apache-kafka":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-kafka index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Kafka Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-kafka?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-kafka?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-kafka_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-kafka\"","tags":["indices"]}},"/v3/index/apache-loggingservices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-loggingservices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Logging Services Known Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-loggingservices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-loggingservices?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-loggingservices_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-loggingservices\"","tags":["indices"]}},"/v3/index/apache-nifi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-nifi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache NiFi Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-nifi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-nifi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-nifi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-nifi\"","tags":["indices"]}},"/v3/index/apache-ofbiz":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-ofbiz index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OFBiz Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-ofbiz?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-ofbiz?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-ofbiz_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-ofbiz\"","tags":["indices"]}},"/v3/index/apache-openmeetings":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openmeetings index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenMeetings Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openmeetings?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openmeetings?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-openmeetings_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-openmeetings\"","tags":["indices"]}},"/v3/index/apache-openoffice":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openoffice index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenOffice Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openoffice?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openoffice?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-openoffice_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-openoffice\"","tags":["indices"]}},"/v3/index/apache-pulsar":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-pulsar index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Pulsar Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-pulsar?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-pulsar?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-pulsar_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-pulsar\"","tags":["indices"]}},"/v3/index/apache-shiro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-shiro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Shiro Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-shiro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-shiro?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-shiro_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-shiro\"","tags":["indices"]}},"/v3/index/apache-spark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-spark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Spark Known Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-spark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-spark?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-spark_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-spark\"","tags":["indices"]}},"/v3/index/apache-struts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-struts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Struts Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-struts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-struts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-struts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-struts\"","tags":["indices"]}},"/v3/index/apache-subversion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-subversion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Subversion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-subversion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-subversion?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-subversion_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-subversion\"","tags":["indices"]}},"/v3/index/apache-superset":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-superset index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Superset CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-superset?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-superset?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-superset_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-superset\"","tags":["indices"]}},"/v3/index/apache-tomcat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-tomcat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Tomcat Security Vunlnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-tomcat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-tomcat?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-tomcat_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-tomcat\"","tags":["indices"]}},"/v3/index/apache-zookeeper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-zookeeper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ZooKeeper Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-zookeeper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-zookeeper?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-zookeeper_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-zookeeper\"","tags":["indices"]}},"/v3/index/appcheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appcheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AppCheck Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appcheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appcheck?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_appcheck_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"appcheck\"","tags":["indices"]}},"/v3/index/appgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Appgate SDP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appgate?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_appgate_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"appgate\"","tags":["indices"]}},"/v3/index/apple":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apple index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apple Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apple?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apple?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apple_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apple\"","tags":["indices"]}},"/v3/index/arch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arch Linux\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arch?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_arch_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"arch\"","tags":["indices"]}},"/v3/index/arista":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arista index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arista Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arista?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arista?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_arista_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"arista\"","tags":["indices"]}},"/v3/index/aruba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aruba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aruba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aruba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aruba?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aruba_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aruba\"","tags":["indices"]}},"/v3/index/asrg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asrg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASRG Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asrg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asrg?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_asrg_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"asrg\"","tags":["indices"]}},"/v3/index/assetnote":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the assetnote index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AssetNote Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/assetnote?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/assetnote?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_assetnote_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"assetnote\"","tags":["indices"]}},"/v3/index/asterisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asterisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Asterisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asterisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asterisk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_asterisk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"asterisk\"","tags":["indices"]}},"/v3/index/astra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the astra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Astra Linux Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/astra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/astra?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_astra_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"astra\"","tags":["indices"]}},"/v3/index/asus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASUSTek Computer Inc.\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_asus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"asus\"","tags":["indices"]}},"/v3/index/atlassian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_atlassian_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"atlassian\"","tags":["indices"]}},"/v3/index/atlassian-vulns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian-vulns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian-vulns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian-vulns?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_atlassian-vulns_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"atlassian-vulns\"","tags":["indices"]}},"/v3/index/atredis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atredis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atredis Partners Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atredis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atredis?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_atredis_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"atredis\"","tags":["indices"]}},"/v3/index/audiocodes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the audiocodes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AudioCodes Product Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/audiocodes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/audiocodes?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_audiocodes_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"audiocodes\"","tags":["indices"]}},"/v3/index/auscert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the auscert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AusCERT Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/auscert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/auscert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_auscert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"auscert\"","tags":["indices"]}},"/v3/index/autodesk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the autodesk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Autodesk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/autodesk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/autodesk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_autodesk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"autodesk\"","tags":["indices"]}},"/v3/index/avaya":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avaya index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avaya Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avaya?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avaya?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_avaya_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"avaya\"","tags":["indices"]}},"/v3/index/aveva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aveva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AVEVA Group Limited\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aveva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aveva?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aveva_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aveva\"","tags":["indices"]}},"/v3/index/avidml-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avidml-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AI Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avidml-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avidml-advs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_avidml-advs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"avidml-advs\"","tags":["indices"]}},"/v3/index/avigilon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avigilon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avigilon Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avigilon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avigilon?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_avigilon_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"avigilon\"","tags":["indices"]}},"/v3/index/aws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AWS Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aws?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aws_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aws\"","tags":["indices"]}},"/v3/index/axis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the axis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Axis OS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/axis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/axis?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_axis_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"axis\"","tags":["indices"]}},"/v3/index/azul":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the azul index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Azul Common Vulnerabilities and Exposures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/azul?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/azul?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_azul_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"azul\"","tags":["indices"]}},"/v3/index/bandr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bandr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B\u0026R Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bandr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bandr?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bandr_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bandr\"","tags":["indices"]}},"/v3/index/baxter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the baxter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Baxter Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/baxter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/baxter?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_baxter_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"baxter\"","tags":["indices"]}},"/v3/index/bbraun":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bbraun index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B. Braun Medical Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bbraun?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bbraun?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bbraun_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bbraun\"","tags":["indices"]}},"/v3/index/bd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Becton Dickinson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bd\"","tags":["indices"]}},"/v3/index/bdu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bdu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BDU Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bdu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bdu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bdu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bdu\"","tags":["indices"]}},"/v3/index/beckhoff":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckhoff index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckhoff Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckhoff?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckhoff?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_beckhoff_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"beckhoff\"","tags":["indices"]}},"/v3/index/beckman-coulter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckman-coulter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckman Coulter Product Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckman-coulter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckman-coulter?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_beckman-coulter_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"beckman-coulter\"","tags":["indices"]}},"/v3/index/belden":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the belden index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Belden Security Bulletins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/belden?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/belden?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_belden_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"belden\"","tags":["indices"]}},"/v3/index/beyond-trust":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beyond-trust index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beyond Trust Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beyond-trust?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beyond-trust?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_beyond-trust_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"beyond-trust\"","tags":["indices"]}},"/v3/index/binarly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the binarly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Binarly Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/binarly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/binarly?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_binarly_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"binarly\"","tags":["indices"]}},"/v3/index/bitdefender":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bitdefender index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bitdefender Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bitdefender?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bitdefender?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bitdefender_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bitdefender\"","tags":["indices"]}},"/v3/index/blackberry":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the blackberry index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BlackBerry Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/blackberry?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/blackberry?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_blackberry_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"blackberry\"","tags":["indices"]}},"/v3/index/bls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Black Lantern Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bls\"","tags":["indices"]}},"/v3/index/bosch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bosch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bosch Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bosch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bosch?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bosch_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bosch\"","tags":["indices"]}},"/v3/index/boston-scientific":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the boston-scientific index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Boston Scientific Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/boston-scientific?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/boston-scientific?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_boston-scientific_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"boston-scientific\"","tags":["indices"]}},"/v3/index/botnets":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the botnets index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Botnets\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/botnets?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/botnets?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_botnets_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"botnets\"","tags":["indices"]}},"/v3/index/ca-cyber-centre":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ca-cyber-centre index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Canadian Centre for Cyber Security Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ca-cyber-centre?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ca-cyber-centre?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ca-cyber-centre_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ca-cyber-centre\"","tags":["indices"]}},"/v3/index/canvas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the canvas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CANVAS Exploit Packs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/canvas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/canvas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_canvas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"canvas\"","tags":["indices"]}},"/v3/index/carestream":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carestream index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carestream Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carestream?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carestream?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_carestream_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"carestream\"","tags":["indices"]}},"/v3/index/cargo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cargo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cargo (Rust) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cargo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cargo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cargo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cargo\"","tags":["indices"]}},"/v3/index/carrier":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carrier index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carrier Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carrier?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carrier?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_carrier_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"carrier\"","tags":["indices"]}},"/v3/index/cbl-mariner":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cbl-mariner index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CBL-Mariner Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cbl-mariner?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cbl-mariner?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cbl-mariner_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cbl-mariner\"","tags":["indices"]}},"/v3/index/centos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the centos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CentOS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/centos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/centos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_centos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"centos\"","tags":["indices"]}},"/v3/index/cert-be":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-be index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert BE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-be?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-be?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-be_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-be\"","tags":["indices"]}},"/v3/index/cert-in":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-in index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT IN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-in?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-in?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-in_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-in\"","tags":["indices"]}},"/v3/index/cert-ir-security-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ir-security-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert IR Security Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ir-security-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ir-security-alerts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-ir-security-alerts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-ir-security-alerts\"","tags":["indices"]}},"/v3/index/cert-se":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-se index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert SE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-se?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-se?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-se_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-se\"","tags":["indices"]}},"/v3/index/cert-ua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert UA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ua?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-ua_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-ua\"","tags":["indices"]}},"/v3/index/certeu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certeu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT-EU The Computer Emergency Response Team for the EU Institutions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certeu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certeu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_certeu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"certeu\"","tags":["indices"]}},"/v3/index/certfr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certfr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert FR Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certfr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certfr?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_certfr_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"certfr\"","tags":["indices"]}},"/v3/index/chainguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chainguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ChainGuard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chainguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chainguard?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_chainguard_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"chainguard\"","tags":["indices"]}},"/v3/index/checkpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the checkpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CheckPoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/checkpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/checkpoint?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_checkpoint_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"checkpoint\"","tags":["indices"]}},"/v3/index/chrome":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chrome index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Google Chrome Release Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chrome?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chrome?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_chrome_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"chrome\"","tags":["indices"]}},"/v3/index/ciena":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ciena index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ciena\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ciena?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ciena?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ciena_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ciena\"","tags":["indices"]}},"/v3/index/cisa-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-alerts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisa-alerts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisa-alerts\"","tags":["indices"]}},"/v3/index/cisa-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories - CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisa-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisa-csaf\"","tags":["indices"]}},"/v3/index/cisa-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA KEV (Known Exploited Vulnerabilities)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-kev?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisa-kev_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisa-kev\"","tags":["indices"]}},"/v3/index/cisco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco\"","tags":["indices"]}},"/v3/index/cisco-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco-csaf\"","tags":["indices"]}},"/v3/index/cisco-known-good-values":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-known-good-values index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Known Good Values\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-known-good-values?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-known-good-values?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco-known-good-values_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco-known-good-values\"","tags":["indices"]}},"/v3/index/cisco-talos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-talos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Talos Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-talos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-talos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco-talos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco-talos\"","tags":["indices"]}},"/v3/index/citrix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the citrix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Citrix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/citrix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/citrix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_citrix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"citrix\"","tags":["indices"]}},"/v3/index/claroty":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the claroty index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Team 82: The Claroty Research Team\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/claroty?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/claroty?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_claroty_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"claroty\"","tags":["indices"]}},"/v3/index/cloudbees":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudbees index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudBees Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudbees?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudbees?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cloudbees_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cloudbees\"","tags":["indices"]}},"/v3/index/cloudvulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudvulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudVulnDB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudvulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudvulndb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cloudvulndb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cloudvulndb\"","tags":["indices"]}},"/v3/index/cnnvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnnvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Chinese National Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnnvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnnvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cnnvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cnnvd\"","tags":["indices"]}},"/v3/index/cnvd-bulletins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-bulletins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-bulletins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-bulletins?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cnvd-bulletins_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cnvd-bulletins\"","tags":["indices"]}},"/v3/index/cnvd-flaws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-flaws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Flaws\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-flaws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-flaws?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cnvd-flaws_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cnvd-flaws\"","tags":["indices"]}},"/v3/index/cocoapods":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cocoapods index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CocoaPods packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cocoapods?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cocoapods?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cocoapods_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cocoapods\"","tags":["indices"]}},"/v3/index/codesys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the codesys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Codesys Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/codesys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/codesys?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_codesys_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"codesys\"","tags":["indices"]}},"/v3/index/commvault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the commvault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Commvault Cloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/commvault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/commvault?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_commvault_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"commvault\"","tags":["indices"]}},"/v3/index/compass-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the compass-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Compass Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/compass-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/compass-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_compass-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"compass-security\"","tags":["indices"]}},"/v3/index/composer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the composer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PHP Composer packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/composer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/composer?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_composer_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"composer\"","tags":["indices"]}},"/v3/index/conan":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the conan index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** C/C++ packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/conan?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/conan?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_conan_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"conan\"","tags":["indices"]}},"/v3/index/coreimpact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the coreimpact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Core Impact\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/coreimpact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/coreimpact?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_coreimpact_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"coreimpact\"","tags":["indices"]}},"/v3/index/cpe-vulnerable":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cpe-vulnerable index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unrolled VulnCheck CPEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cpe-vulnerable?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cpe-vulnerable?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cpe-vulnerable_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cpe-vulnerable\"","tags":["indices"]}},"/v3/index/crestron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crestron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Crestron Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crestron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crestron?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_crestron_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"crestron\"","tags":["indices"]}},"/v3/index/crowdsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crowdsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CrowdSec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crowdsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crowdsec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_crowdsec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"crowdsec\"","tags":["indices"]}},"/v3/index/curl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the curl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Curl CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/curl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/curl?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_curl_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"curl\"","tags":["indices"]}},"/v3/index/cwe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cwe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Common Weakness Enumeration Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cwe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cwe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cwe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CWE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cwe\"","tags":["indices"]}},"/v3/index/dahua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dahua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dahua Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dahua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dahua?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dahua_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dahua\"","tags":["indices"]}},"/v3/index/danfoss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the danfoss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Danfoss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/danfoss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/danfoss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_danfoss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"danfoss\"","tags":["indices"]}},"/v3/index/dassault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dassault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dassault Systèmes Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dassault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dassault?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dassault_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dassault\"","tags":["indices"]}},"/v3/index/debian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian\"","tags":["indices"]}},"/v3/index/debian-dsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-dsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-dsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-dsa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian-dsa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian-dsa\"","tags":["indices"]}},"/v3/index/debian-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-packages?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian-packages_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian-packages\"","tags":["indices"]}},"/v3/index/debian-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian PURLs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian-purls\"","tags":["indices"]}},"/v3/index/dell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dell Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dell?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dell_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dell\"","tags":["indices"]}},"/v3/index/delta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the delta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Delta Controls Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/delta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/delta?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_delta_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"delta\"","tags":["indices"]}},"/v3/index/dfn-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dfn-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DFN-CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dfn-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dfn-cert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dfn-cert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dfn-cert\"","tags":["indices"]}},"/v3/index/django":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the django index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Django Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/django?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/django?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_django_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"django\"","tags":["indices"]}},"/v3/index/dlink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dlink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DLink Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dlink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dlink?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dlink_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dlink\"","tags":["indices"]}},"/v3/index/dnn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dnn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DNN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dnn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dnn?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dnn_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dnn\"","tags":["indices"]}},"/v3/index/dotcms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dotcms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DotCMS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dotcms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dotcms?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dotcms_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dotcms\"","tags":["indices"]}},"/v3/index/dragos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dragos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dragos Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dragos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dragos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dragos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dragos\"","tags":["indices"]}},"/v3/index/draytek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the draytek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DrayTek Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/draytek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/draytek?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_draytek_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"draytek\"","tags":["indices"]}},"/v3/index/drupal":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the drupal index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Drupal Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/drupal?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/drupal?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_drupal_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"drupal\"","tags":["indices"]}},"/v3/index/eaton":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eaton index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Eaton Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eaton?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eaton?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eaton_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eaton\"","tags":["indices"]}},"/v3/index/elastic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elastic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elastic Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elastic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elastic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_elastic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"elastic\"","tags":["indices"]}},"/v3/index/elspec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elspec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elspec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elspec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elspec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_elspec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"elspec\"","tags":["indices"]}},"/v3/index/emerging-threats-snort":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerging-threats-snort index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerging Threats Snort\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerging-threats-snort?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerging-threats-snort?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_emerging-threats-snort_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"emerging-threats-snort\"","tags":["indices"]}},"/v3/index/emerson":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerson index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerson Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerson?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerson?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_emerson_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"emerson\"","tags":["indices"]}},"/v3/index/endoflife":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endoflife index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** End Of Life\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endoflife?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endoflife?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_endoflife_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"endoflife\"","tags":["indices"]}},"/v3/index/endress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Endress \u0026 Hauser Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endress?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_endress_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"endress\"","tags":["indices"]}},"/v3/index/eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck EOL Coverage\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eol_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eol\"","tags":["indices"]}},"/v3/index/eol-alibaba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-alibaba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-alibaba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-alibaba?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eol-alibaba_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eol-alibaba\"","tags":["indices"]}},"/v3/index/eol-microsoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-microsoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-microsoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-microsoft?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eol-microsoft_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eol-microsoft\"","tags":["indices"]}},"/v3/index/epss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the epss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** EPSS Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/epss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/epss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_epss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"epss\"","tags":["indices"]}},"/v3/index/euvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the euvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** European Union Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/euvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/euvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_euvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"euvd\"","tags":["indices"]}},"/v3/index/exodus-intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exodus-intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Exodus Intelligence Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exodus-intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exodus-intel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exodus-intel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exodus-intel\"","tags":["indices"]}},"/v3/index/exploit-chains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploit-chains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Chains\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploit-chains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploit-chains?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploit-chains_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploit-chains\"","tags":["indices"]}},"/v3/index/exploitdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploitdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Exploit Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploitdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploitdb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploitdb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploitdb\"","tags":["indices"]}},"/v3/index/exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Intelligence Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploits\"","tags":["indices"]}},"/v3/index/exploits-changelog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits-changelog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Changelog for VC Exploits Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits-changelog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits-changelog?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploits-changelog_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploits-changelog\"","tags":["indices"]}},"/v3/index/f-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F-Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f-secure?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_f-secure_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"f-secure\"","tags":["indices"]}},"/v3/index/f5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F5 Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f5?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_f5_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"f5\"","tags":["indices"]}},"/v3/index/fanuc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fanuc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fanuc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fanuc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fanuc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fanuc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fanuc\"","tags":["indices"]}},"/v3/index/fastly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fastly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fastly Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fastly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fastly?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fastly_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fastly\"","tags":["indices"]}},"/v3/index/fedora":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fedora index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fedora Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fedora?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fedora?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fedora_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fedora\"","tags":["indices"]}},"/v3/index/festo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the festo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Festo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/festo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/festo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_festo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"festo\"","tags":["indices"]}},"/v3/index/filecloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filecloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filecloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filecloud?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_filecloud_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"filecloud\"","tags":["indices"]}},"/v3/index/filezilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filezilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileZilla Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filezilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filezilla?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_filezilla_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"filezilla\"","tags":["indices"]}},"/v3/index/flatt-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the flatt-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Flatt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/flatt-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/flatt-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_flatt-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"flatt-security\"","tags":["indices"]}},"/v3/index/forgerock":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the forgerock index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ForgeRock Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/forgerock?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/forgerock?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_forgerock_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"forgerock\"","tags":["indices"]}},"/v3/index/fortinet":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FortiGuard Fortinet\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fortinet_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fortinet\"","tags":["indices"]}},"/v3/index/fortinet-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fortinet Labs Threat Encyclopedia\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet-ips?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fortinet-ips_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fortinet-ips\"","tags":["indices"]}},"/v3/index/foxit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the foxit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Foxit Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/foxit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/foxit?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_foxit_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"foxit\"","tags":["indices"]}},"/v3/index/freebsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the freebsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FreeBSD Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/freebsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/freebsd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_freebsd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"freebsd\"","tags":["indices"]}},"/v3/index/fresenius":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fresenius index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fresenius Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fresenius?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fresenius?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fresenius_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fresenius\"","tags":["indices"]}},"/v3/index/gallagher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gallagher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gallagher Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gallagher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gallagher?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gallagher_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gallagher\"","tags":["indices"]}},"/v3/index/gcp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gcp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GCP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gcp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gcp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gcp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gcp\"","tags":["indices"]}},"/v3/index/ge-gas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-gas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Gas Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-gas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-gas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ge-gas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ge-gas\"","tags":["indices"]}},"/v3/index/ge-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Healthcare Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ge-healthcare_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ge-healthcare\"","tags":["indices"]}},"/v3/index/gem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruby (gem) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gem?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gem_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gem\"","tags":["indices"]}},"/v3/index/gen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gen Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gen?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gen_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gen\"","tags":["indices"]}},"/v3/index/genetec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the genetec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Genetec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/genetec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/genetec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_genetec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"genetec\"","tags":["indices"]}},"/v3/index/ghsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ghsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GHSA\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ghsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ghsa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ghsa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ghsa\"","tags":["indices"]}},"/v3/index/gigabyte":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gigabyte index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GIGABYTE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gigabyte?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gigabyte?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gigabyte_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gigabyte\"","tags":["indices"]}},"/v3/index/gitee-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitee-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gitee Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitee-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitee-exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gitee-exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gitee-exploits\"","tags":["indices"]}},"/v3/index/github-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitHub Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_github-exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"github-exploits\"","tags":["indices"]}},"/v3/index/github-security-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-security-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Github Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-security-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-security-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_github-security-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"github-security-advisories\"","tags":["indices"]}},"/v3/index/gitlab-advisories-community":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-advisories-community index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Advisory Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-advisories-community?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-advisories-community?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gitlab-advisories-community_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gitlab-advisories-community\"","tags":["indices"]}},"/v3/index/gitlab-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gitlab-exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gitlab-exploits\"","tags":["indices"]}},"/v3/index/glibc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the glibc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Glibc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/glibc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/glibc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_glibc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"glibc\"","tags":["indices"]}},"/v3/index/gmo-cybersecurity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gmo-cybersecurity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GMO Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gmo-cybersecurity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gmo-cybersecurity?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gmo-cybersecurity_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gmo-cybersecurity\"","tags":["indices"]}},"/v3/index/gnutls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gnutls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GnuTLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gnutls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gnutls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gnutls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gnutls\"","tags":["indices"]}},"/v3/index/go-vulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the go-vulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Go Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/go-vulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/go-vulndb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_go-vulndb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"go-vulndb\"","tags":["indices"]}},"/v3/index/golang":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the golang index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Golang packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/golang?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/golang?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_golang_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"golang\"","tags":["indices"]}},"/v3/index/google-0day-itw":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-0day-itw index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Project Zero In the Wild Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-0day-itw?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-0day-itw?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_google-0day-itw_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"google-0day-itw\"","tags":["indices"]}},"/v3/index/google-container-optimized-os":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-container-optimized-os index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Container OS Release Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-container-optimized-os?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-container-optimized-os?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_google-container-optimized-os_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"google-container-optimized-os\"","tags":["indices"]}},"/v3/index/grafana":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the grafana index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Grafana Labs Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/grafana?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/grafana?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_grafana_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"grafana\"","tags":["indices"]}},"/v3/index/greynoise-metadata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the greynoise-metadata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GreyNoise Metadata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/greynoise-metadata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/greynoise-metadata?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_greynoise-metadata_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"greynoise-metadata\"","tags":["indices"]}},"/v3/index/hackage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hackage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackage (Haskell) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hackage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hackage?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hackage_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hackage\"","tags":["indices"]}},"/v3/index/hacktivity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hacktivity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackerone Hacktivity\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hacktivity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hacktivity?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hacktivity_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hacktivity\"","tags":["indices"]}},"/v3/index/harmonyos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the harmonyos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HarmonyOS Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/harmonyos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/harmonyos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_harmonyos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"harmonyos\"","tags":["indices"]}},"/v3/index/hashicorp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hashicorp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HashiCorp Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hashicorp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hashicorp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hashicorp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hashicorp\"","tags":["indices"]}},"/v3/index/haskell-sadb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the haskell-sadb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Haskell Security Advisory DB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/haskell-sadb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/haskell-sadb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_haskell-sadb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"haskell-sadb\"","tags":["indices"]}},"/v3/index/hcl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hcl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HCLSoftware Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hcl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hcl?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hcl_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hcl\"","tags":["indices"]}},"/v3/index/hex":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hex index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hex (Erlang) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hex?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hex?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hex_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hex\"","tags":["indices"]}},"/v3/index/hikvision":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hikvision index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hikvision Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hikvision?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hikvision?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hikvision_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hikvision\"","tags":["indices"]}},"/v3/index/hillrom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hillrom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hillrom Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hillrom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hillrom?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hillrom_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hillrom\"","tags":["indices"]}},"/v3/index/hitachi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Software Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hitachi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hitachi\"","tags":["indices"]}},"/v3/index/hitachi-energy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi-energy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Energy Cybersecurity Advisories and Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi-energy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi-energy?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hitachi-energy_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hitachi-energy\"","tags":["indices"]}},"/v3/index/hkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hong Kong CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hkcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hkcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hkcert\"","tags":["indices"]}},"/v3/index/hms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HMS (Hardware Meets Software) Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hms?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hms_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hms\"","tags":["indices"]}},"/v3/index/honeywell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Honeywell Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/honeywell?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_honeywell_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"honeywell\"","tags":["indices"]}},"/v3/index/hp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hp\"","tags":["indices"]}},"/v3/index/hpe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HPE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hpe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hpe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hpe\"","tags":["indices"]}},"/v3/index/huawei-euleros":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenEuler Operating System Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-euleros?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_huawei-euleros_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"huawei-euleros\"","tags":["indices"]}},"/v3/index/huawei-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei IPS Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-ips?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_huawei-ips_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"huawei-ips\"","tags":["indices"]}},"/v3/index/huawei-psirt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-psirt?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_huawei-psirt_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"huawei-psirt\"","tags":["indices"]}},"/v3/index/iava":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the iava index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Information Assurance Vulnerability Alerts (IAVA)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/iava?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_iava_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"iava\"","tags":["indices"]}},"/v3/index/ibm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IBM Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ibm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ibm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ibm\"","tags":["indices"]}},"/v3/index/idemia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Idemia Product Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/idemia?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_idemia_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"idemia\"","tags":["indices"]}},"/v3/index/igel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the igel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IGEL Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/igel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_igel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"igel\"","tags":["indices"]}},"/v3/index/il-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-alerts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_il-alerts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"il-alerts\"","tags":["indices"]}},"/v3/index/il-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il CVE Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_il-vulnerabilities_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"il-vulnerabilities\"","tags":["indices"]}},"/v3/index/incibe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Incibe CERT Early Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/incibe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_incibe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"incibe\"","tags":["indices"]}},"/v3/index/initial-access":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_initial-access_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"initial-access\"","tags":["indices"]}},"/v3/index/initial-access-git":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access-git?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_initial-access-git_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"initial-access-git\"","tags":["indices"]}},"/v3/index/intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Intel® Product Security Center Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/intel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_intel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"intel\"","tags":["indices"]}},"/v3/index/ipintel-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-10d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-10d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-10d\"","tags":["indices"]}},"/v3/index/ipintel-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-30d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-30d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-30d\"","tags":["indices"]}},"/v3/index/ipintel-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-3d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-3d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-3d\"","tags":["indices"]}},"/v3/index/ipintel-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-90d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-90d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-90d\"","tags":["indices"]}},"/v3/index/istio":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the istio index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Istio Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/istio?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_istio_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"istio\"","tags":["indices"]}},"/v3/index/ivanti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ivanti_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ivanti\"","tags":["indices"]}},"/v3/index/ivanti-rss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti-rss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ivanti-rss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ivanti-rss\"","tags":["indices"]}},"/v3/index/jenkins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Jenkins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jenkins?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jenkins_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jenkins\"","tags":["indices"]}},"/v3/index/jetbrains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JetBrains Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jetbrains?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jetbrains_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jetbrains\"","tags":["indices"]}},"/v3/index/jfrog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JFrog Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jfrog?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jfrog_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jfrog\"","tags":["indices"]}},"/v3/index/jnj":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Johnson \u0026 Johnson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jnj?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jnj_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jnj\"","tags":["indices"]}},"/v3/index/johnson-controls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Advisories - Johnson Controls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/johnson-controls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_johnson-controls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"johnson-controls\"","tags":["indices"]}},"/v3/index/juniper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Juniper Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/juniper?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_juniper_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"juniper\"","tags":["indices"]}},"/v3/index/jvn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvn?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jvn_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jvn\"","tags":["indices"]}},"/v3/index/jvndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvndb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jvndb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jvndb\"","tags":["indices"]}},"/v3/index/kaspersky-ics-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kaspersky ICS CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kaspersky-ics-cert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_kaspersky-ics-cert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"kaspersky-ics-cert\"","tags":["indices"]}},"/v3/index/korelogic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KoreLogic Vulnerability Research and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/korelogic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_korelogic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"korelogic\"","tags":["indices"]}},"/v3/index/krcert-security-notices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-security-notices?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_krcert-security-notices_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"krcert-security-notices\"","tags":["indices"]}},"/v3/index/krcert-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_krcert-vulnerabilities_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"krcert-vulnerabilities\"","tags":["indices"]}},"/v3/index/kubernetes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kubernetes Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kubernetes?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_kubernetes_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"kubernetes\"","tags":["indices"]}},"/v3/index/kunbus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KunBus Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kunbus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_kunbus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"kunbus\"","tags":["indices"]}},"/v3/index/lantronix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lantronix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lantronix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lantronix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lantronix\"","tags":["indices"]}},"/v3/index/lenovo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lenovo Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lenovo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lenovo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lenovo\"","tags":["indices"]}},"/v3/index/lexmark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lexmark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lexmark?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lexmark_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lexmark\"","tags":["indices"]}},"/v3/index/lg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** LG Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lg?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lg_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lg\"","tags":["indices"]}},"/v3/index/libre-office":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Libre Office Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/libre-office?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_libre-office_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"libre-office\"","tags":["indices"]}},"/v3/index/linux":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the linux index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Linux Kernel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/linux?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_linux_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"linux\"","tags":["indices"]}},"/v3/index/lol-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Living Off the Land Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lol-advs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lol-advs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lol-advs\"","tags":["indices"]}},"/v3/index/m-files":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** M-Files Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/m-files?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_m-files_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"m-files\"","tags":["indices"]}},"/v3/index/macert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the macert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moroccan CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/macert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_macert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"macert\"","tags":["indices"]}},"/v3/index/malicious-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-packages?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_malicious-packages_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"malicious-packages\"","tags":["indices"]}},"/v3/index/malicious-vscode-exts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Visual Studio Code Extensions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-vscode-exts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_malicious-vscode-exts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MaliciousVSCodeExts-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"malicious-vscode-exts\"","tags":["indices"]}},"/v3/index/manageengine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ManageEngine Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/manageengine?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_manageengine_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"manageengine\"","tags":["indices"]}},"/v3/index/maven":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the maven index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Maven (Java) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/maven?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_maven_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"maven\"","tags":["indices"]}},"/v3/index/mbed-tls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mbed TLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mbed-tls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mbed-tls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mbed-tls\"","tags":["indices"]}},"/v3/index/mcafee":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** McAfee Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mcafee?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mcafee_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mcafee\"","tags":["indices"]}},"/v3/index/mediatek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MediaTek Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mediatek?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mediatek_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mediatek\"","tags":["indices"]}},"/v3/index/medtronic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Medtronic Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/medtronic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_medtronic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"medtronic\"","tags":["indices"]}},"/v3/index/mendix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mendix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mendix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mendix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mendix\"","tags":["indices"]}},"/v3/index/meta-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Meta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/meta-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_meta-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"meta-advisories\"","tags":["indices"]}},"/v3/index/metasploit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Metasploit Modules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/metasploit?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_metasploit_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"metasploit\"","tags":["indices"]}},"/v3/index/microsoft-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-csaf\"","tags":["indices"]}},"/v3/index/microsoft-cvrf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-cvrf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-cvrf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-cvrf\"","tags":["indices"]}},"/v3/index/microsoft-driver-block-list":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft's Vulnerable Drivers Blocklist\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-driver-block-list?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-driver-block-list_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-driver-block-list\"","tags":["indices"]}},"/v3/index/microsoft-kb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft KB list by CVE\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-kb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-kb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-kb\"","tags":["indices"]}},"/v3/index/mikrotik":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MikroTik Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mikrotik?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mikrotik_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mikrotik\"","tags":["indices"]}},"/v3/index/mindray":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mindray Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mindray?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mindray_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mindray\"","tags":["indices"]}},"/v3/index/misp-threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MISP Threat Actors\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/misp-threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_misp-threat-actors_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"misp-threat-actors\"","tags":["indices"]}},"/v3/index/mitel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitel\"","tags":["indices"]}},"/v3/index/mitre-attack-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE ATT\u0026CK Technique ID to CVE List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-attack-cve?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitre-attack-cve_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitre-attack-cve\"","tags":["indices"]}},"/v3/index/mitre-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitre-cvelist-v5_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitre-cvelist-v5\"","tags":["indices"]}},"/v3/index/mitsubishi-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitsubishi Electric Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitsubishi-electric?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitsubishi-electric_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitsubishi-electric\"","tags":["indices"]}},"/v3/index/mongodb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MongoDB Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mongodb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mongodb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mongodb\"","tags":["indices"]}},"/v3/index/moxa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moxa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/moxa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_moxa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"moxa\"","tags":["indices"]}},"/v3/index/mozilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mozilla Foundation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mozilla?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mozilla_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mozilla\"","tags":["indices"]}},"/v3/index/naver":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the naver index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Naver Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/naver?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_naver_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"naver\"","tags":["indices"]}},"/v3/index/ncsc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ncsc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ncsc\"","tags":["indices"]}},"/v3/index/ncsc-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc-cves?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ncsc-cves_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ncsc-cves\"","tags":["indices"]}},"/v3/index/nec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NEC Security Information Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nec\"","tags":["indices"]}},"/v3/index/nessus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nessus Plugins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nessus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nessus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nessus\"","tags":["indices"]}},"/v3/index/netapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NetApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netapp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netapp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netapp\"","tags":["indices"]}},"/v3/index/netatalk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netatalk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netatalk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netatalk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netatalk\"","tags":["indices"]}},"/v3/index/netgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netgate Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgate?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netgate_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netgate\"","tags":["indices"]}},"/v3/index/netgear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NETGEAR Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgear?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netgear_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netgear\"","tags":["indices"]}},"/v3/index/netskope":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netskope Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netskope?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netskope_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netskope\"","tags":["indices"]}},"/v3/index/nexpose":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nexpose Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nexpose?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nexpose_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nexpose\"","tags":["indices"]}},"/v3/index/nginx":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nginx Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nginx?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nginx_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nginx\"","tags":["indices"]}},"/v3/index/nhs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NHS Cyber Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nhs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nhs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nhs\"","tags":["indices"]}},"/v3/index/ni":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ni index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** National Instruments Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ni?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ni_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ni\"","tags":["indices"]}},"/v3/index/nist-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd\"","tags":["indices"]}},"/v3/index/nist-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd2_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd2\"","tags":["indices"]}},"/v3/index/nist-nvd2-cpematch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 CPE Match\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-cpematch?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd2-cpematch_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd2-cpematch\"","tags":["indices"]}},"/v3/index/nist-nvd2-sources":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 Source Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-sources?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd2-sources_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd2-sources\"","tags":["indices"]}},"/v3/index/node-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Node.js Security Working Group Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/node-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_node-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"node-security\"","tags":["indices"]}},"/v3/index/nodejs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NodeJS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nodejs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nodejs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nodejs\"","tags":["indices"]}},"/v3/index/nokia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nokia Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nokia?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nokia_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nokia\"","tags":["indices"]}},"/v3/index/notepadplusplus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Notepad++ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/notepadplusplus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_notepadplusplus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"notepadplusplus\"","tags":["indices"]}},"/v3/index/nozomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nozomi Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nozomi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nozomi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nozomi\"","tags":["indices"]}},"/v3/index/npm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the npm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NPM (JS/TS) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/npm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_npm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"npm\"","tags":["indices"]}},"/v3/index/ntp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NTP Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ntp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ntp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ntp\"","tags":["indices"]}},"/v3/index/nuclei":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuclei Templates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuclei?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nuclei_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nuclei\"","tags":["indices"]}},"/v3/index/nuget":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuget (C#/F#) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuget?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nuget_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nuget\"","tags":["indices"]}},"/v3/index/nvd-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVD's CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvd-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nvd-cpe-dictionary_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nvd-cpe-dictionary\"","tags":["indices"]}},"/v3/index/nvidia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVIDIA Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvidia?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nvidia_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nvidia\"","tags":["indices"]}},"/v3/index/nz-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT NZ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nz-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nz-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nz-advisories\"","tags":["indices"]}},"/v3/index/octopus-deploy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Octopus Deploy Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/octopus-deploy?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_octopus-deploy_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"octopus-deploy\"","tags":["indices"]}},"/v3/index/okta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the okta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Okta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/okta?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_okta_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"okta\"","tags":["indices"]}},"/v3/index/omron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron Vulnerability Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_omron_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"omron\"","tags":["indices"]}},"/v3/index/omron-eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron End of Life Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron-eol?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_omron-eol_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"omron-eol\"","tags":["indices"]}},"/v3/index/one-e":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 1E Published Product Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/one-e?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_one-e_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"one-e\"","tags":["indices"]}},"/v3/index/opam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** opam (OCaml) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opam?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_opam_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"opam\"","tags":["indices"]}},"/v3/index/open-cvdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Open Cloud Vulnerability \u0026 Security Issue Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/open-cvdb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_open-cvdb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"open-cvdb\"","tags":["indices"]}},"/v3/index/openbsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenBSD Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openbsd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openbsd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openbsd\"","tags":["indices"]}},"/v3/index/opengear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Opengear Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opengear?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_opengear_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"opengear\"","tags":["indices"]}},"/v3/index/openjdk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenJDK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openjdk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openjdk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openjdk\"","tags":["indices"]}},"/v3/index/openssh":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSH Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssh?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openssh_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openssh\"","tags":["indices"]}},"/v3/index/openssl-secadv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSL Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssl-secadv?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openssl-secadv_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openssl-secadv\"","tags":["indices"]}},"/v3/index/openstack":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenStack Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openstack?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openstack_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openstack\"","tags":["indices"]}},"/v3/index/openwrt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenWrt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openwrt?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openwrt_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openwrt\"","tags":["indices"]}},"/v3/index/oracle":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_oracle_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"oracle\"","tags":["indices"]}},"/v3/index/oracle-cpu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Update Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_oracle-cpu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"oracle-cpu\"","tags":["indices"]}},"/v3/index/oracle-cpu-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Updates CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_oracle-cpu-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"oracle-cpu-csaf\"","tags":["indices"]}},"/v3/index/osv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the osv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Open Source Vulnerabilities Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/osv?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_osv_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"osv\"","tags":["indices"]}},"/v3/index/otrs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OTRS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/otrs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_otrs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"otrs\"","tags":["indices"]}},"/v3/index/owncloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OwnCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/owncloud?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_owncloud_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"owncloud\"","tags":["indices"]}},"/v3/index/packetstorm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PacketStorm\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/packetstorm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_packetstorm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"packetstorm\"","tags":["indices"]}},"/v3/index/palantir":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palantir Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palantir?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_palantir_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"palantir\"","tags":["indices"]}},"/v3/index/palo-alto":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palo Alto Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palo-alto?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_palo-alto_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"palo-alto\"","tags":["indices"]}},"/v3/index/panasonic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Panasonic Vulnerability Advisory List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/panasonic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_panasonic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"panasonic\"","tags":["indices"]}},"/v3/index/papercut":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PaperCut Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/papercut?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_papercut_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"papercut\"","tags":["indices"]}},"/v3/index/pega":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pega index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pega Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pega?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pega_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pega\"","tags":["indices"]}},"/v3/index/philips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the philips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Philips Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/philips?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_philips_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"philips\"","tags":["indices"]}},"/v3/index/phoenix-contact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Phoenix Contact Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/phoenix-contact?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_phoenix-contact_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"phoenix-contact\"","tags":["indices"]}},"/v3/index/php-my-admin":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** phpMyAdmin Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/php-my-admin?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_php-my-admin_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"php-my-admin\"","tags":["indices"]}},"/v3/index/pkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PK CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pkcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pkcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pkcert\"","tags":["indices"]}},"/v3/index/postgressql":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PostgresSQL Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/postgressql?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_postgressql_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"postgressql\"","tags":["indices"]}},"/v3/index/powerdns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PowerDNS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/powerdns?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_powerdns_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"powerdns\"","tags":["indices"]}},"/v3/index/progress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the progress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Progress Product Alert Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/progress?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_progress_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"progress\"","tags":["indices"]}},"/v3/index/proofpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Proofpoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/proofpoint?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_proofpoint_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"proofpoint\"","tags":["indices"]}},"/v3/index/ptc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PTC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ptc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ptc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ptc\"","tags":["indices"]}},"/v3/index/pub":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pub index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pub (Dart/Flutter) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pub?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pub_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pub\"","tags":["indices"]}},"/v3/index/pure-storage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pure Storage Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pure-storage?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pure-storage_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pure-storage\"","tags":["indices"]}},"/v3/index/pypa-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypa-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pypa-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pypa-advisories\"","tags":["indices"]}},"/v3/index/pypi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPi (Python) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pypi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pypi\"","tags":["indices"]}},"/v3/index/qnap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** QNAP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qnap?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qnap_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qnap\"","tags":["indices"]}},"/v3/index/qqids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QIDs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qqids?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qqids_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qqids\"","tags":["indices"]}},"/v3/index/qualcomm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualcomm Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualcomm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qualcomm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qualcomm\"","tags":["indices"]}},"/v3/index/qualys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qualys_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qualys\"","tags":["indices"]}},"/v3/index/qualys-qids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QID\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys-qids?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qualys-qids_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qualys-qids\"","tags":["indices"]}},"/v3/index/qubes-qsb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qubes Security Bulletin\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qubes-qsb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qubes-qsb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qubes-qsb\"","tags":["indices"]}},"/v3/index/ransomware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Ransomware\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ransomware?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ransomware_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ransomware\"","tags":["indices"]}},"/v3/index/red-lion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red-Lion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/red-lion?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_red-lion_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"red-lion\"","tags":["indices"]}},"/v3/index/redhat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red Hat Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_redhat_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"redhat\"","tags":["indices"]}},"/v3/index/redhat-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSAF data for redhat\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat-cves?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_redhat-cves_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"redhat-cves\"","tags":["indices"]}},"/v3/index/renesas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Renesas Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/renesas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_renesas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"renesas\"","tags":["indices"]}},"/v3/index/revive":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the revive index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Revive Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/revive?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_revive_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"revive\"","tags":["indices"]}},"/v3/index/roche":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the roche index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Roche Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/roche?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_roche_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"roche\"","tags":["indices"]}},"/v3/index/rockwell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rockwell Automation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rockwell?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rockwell_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rockwell\"","tags":["indices"]}},"/v3/index/rocky":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rocky_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rocky\"","tags":["indices"]}},"/v3/index/rocky-errata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Errata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-errata?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rocky-errata_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rocky-errata\"","tags":["indices"]}},"/v3/index/rocky-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rocky-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rocky-purls\"","tags":["indices"]}},"/v3/index/rsync":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rsync Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rsync?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rsync_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rsync\"","tags":["indices"]}},"/v3/index/ruckus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruckus Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ruckus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ruckus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ruckus\"","tags":["indices"]}},"/v3/index/rustsec-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** RustSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rustsec-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rustsec-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rustsec-advisories\"","tags":["indices"]}},"/v3/index/sacert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Saudi CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sacert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sacert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sacert\"","tags":["indices"]}},"/v3/index/safran":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the safran index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Safran Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/safran?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_safran_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"safran\"","tags":["indices"]}},"/v3/index/saint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the saint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAINT Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/saint?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_saint_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"saint\"","tags":["indices"]}},"/v3/index/salesforce":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SalesForce Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/salesforce?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_salesforce_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"salesforce\"","tags":["indices"]}},"/v3/index/samba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the samba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Samba Security Releases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/samba?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_samba_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"samba\"","tags":["indices"]}},"/v3/index/sandisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sandisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sandisk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sandisk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sandisk\"","tags":["indices"]}},"/v3/index/sans-dshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SANS DShield Honeypot Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sans-dshield?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sans-dshield_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sans-dshield\"","tags":["indices"]}},"/v3/index/sap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAP Security Patch Days\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sap?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sap_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sap\"","tags":["indices"]}},"/v3/index/schneider-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schneider Electric Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schneider-electric?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_schneider-electric_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"schneider-electric\"","tags":["indices"]}},"/v3/index/schutzwerk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schutzwerk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schutzwerk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_schutzwerk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"schutzwerk\"","tags":["indices"]}},"/v3/index/sec-consult":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SEC Consult Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sec-consult?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sec-consult_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sec-consult\"","tags":["indices"]}},"/v3/index/securitylab":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Lab Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/securitylab?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_securitylab_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"securitylab\"","tags":["indices"]}},"/v3/index/seebug":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Seebug Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/seebug?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_seebug_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"seebug\"","tags":["indices"]}},"/v3/index/sel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schweitzer Engineering Laboratories Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sel\"","tags":["indices"]}},"/v3/index/sentinelone":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SentinelOne Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sentinelone?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sentinelone_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sentinelone\"","tags":["indices"]}},"/v3/index/servicenow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ServiceNow CVE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/servicenow?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_servicenow_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"servicenow\"","tags":["indices"]}},"/v3/index/shadowserver-exploited":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shadowserver Foundation Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shadowserver-exploited?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_shadowserver-exploited_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"shadowserver-exploited\"","tags":["indices"]}},"/v3/index/shielder":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shielder Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shielder?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_shielder_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"shielder\"","tags":["indices"]}},"/v3/index/sick":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sick index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SICK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sick?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sick_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sick\"","tags":["indices"]}},"/v3/index/siemens":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Siemens Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/siemens?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_siemens_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"siemens\"","tags":["indices"]}},"/v3/index/sierra-wireless":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sierra Wireless Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sierra-wireless?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sierra-wireless_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sierra-wireless\"","tags":["indices"]}},"/v3/index/sigmahq-sigma-rules":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sigma Rules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sigmahq-sigma-rules?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sigmahq-sigma-rules_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sigmahq-sigma-rules\"","tags":["indices"]}},"/v3/index/singcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSA Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/singcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_singcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"singcert\"","tags":["indices"]}},"/v3/index/sitecore":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sitecore Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sitecore?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sitecore_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sitecore\"","tags":["indices"]}},"/v3/index/slackware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Slackware Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/slackware?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_slackware_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"slackware\"","tags":["indices"]}},"/v3/index/solarwinds":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SolarWinds Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solarwinds?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_solarwinds_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"solarwinds\"","tags":["indices"]}},"/v3/index/solr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Solr CVE Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solr?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_solr_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"solr\"","tags":["indices"]}},"/v3/index/sonatype":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sonatype Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonatype?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sonatype_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sonatype\"","tags":["indices"]}},"/v3/index/sonicwall":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SonicWall Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonicwall?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sonicwall_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sonicwall\"","tags":["indices"]}},"/v3/index/spacelabs-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spacelabs Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spacelabs-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_spacelabs-healthcare_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"spacelabs-healthcare\"","tags":["indices"]}},"/v3/index/splunk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Splunk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/splunk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_splunk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"splunk\"","tags":["indices"]}},"/v3/index/spring":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spring index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spring Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spring?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_spring_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"spring\"","tags":["indices"]}},"/v3/index/ssd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SSD Secure Disclosure Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ssd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ssd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ssd\"","tags":["indices"]}},"/v3/index/stormshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stormshield Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stormshield?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_stormshield_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"stormshield\"","tags":["indices"]}},"/v3/index/stryker":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stryker Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stryker?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_stryker_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"stryker\"","tags":["indices"]}},"/v3/index/sudo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sudo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sudo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sudo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sudo\"","tags":["indices"]}},"/v3/index/suse":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SUSE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_suse_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"suse\"","tags":["indices"]}},"/v3/index/suse-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Suse Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_suse-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"suse-security\"","tags":["indices"]}},"/v3/index/swift":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swift index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swift packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swift?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_swift_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"swift\"","tags":["indices"]}},"/v3/index/swisslog-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swisslog Healthcare CVE Disclosures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swisslog-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_swisslog-healthcare_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"swisslog-healthcare\"","tags":["indices"]}},"/v3/index/symfony":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Symfony Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/symfony?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_symfony_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"symfony\"","tags":["indices"]}},"/v3/index/synacktiv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synacktiv Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synacktiv?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_synacktiv_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"synacktiv\"","tags":["indices"]}},"/v3/index/syncrosoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SyncroSoft Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syncrosoft?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_syncrosoft_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"syncrosoft\"","tags":["indices"]}},"/v3/index/synology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synology?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_synology_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"synology\"","tags":["indices"]}},"/v3/index/syss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Syss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_syss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"syss\"","tags":["indices"]}},"/v3/index/tailscale":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tailscale Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tailscale?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tailscale_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tailscale\"","tags":["indices"]}},"/v3/index/teamviewer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TeamViewer Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/teamviewer?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_teamviewer_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"teamviewer\"","tags":["indices"]}},"/v3/index/tenable-research-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tenable Research Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tenable-research-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tenable-research-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tenable-research-advisories\"","tags":["indices"]}},"/v3/index/tencent":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tencent Vulnerability Risk Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tencent?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tencent_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tencent\"","tags":["indices"]}},"/v3/index/thales":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thales index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thales Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thales?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_thales_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"thales\"","tags":["indices"]}},"/v3/index/themissinglink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** the missing link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/themissinglink?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_themissinglink_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"themissinglink\"","tags":["indices"]}},"/v3/index/thermo-fisher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thermo Fisher Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thermo-fisher?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_thermo-fisher_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"thermo-fisher\"","tags":["indices"]}},"/v3/index/threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Threat Actors Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_threat-actors_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"threat-actors\"","tags":["indices"]}},"/v3/index/ti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Texas Instruments Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ti?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ti_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ti\"","tags":["indices"]}},"/v3/index/tibco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TIBCO Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tibco?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tibco_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tibco\"","tags":["indices"]}},"/v3/index/tp-link":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TP-Link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tp-link?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tp-link_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tp-link\"","tags":["indices"]}},"/v3/index/trane-technology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trane Technology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trane-technology?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_trane-technology_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"trane-technology\"","tags":["indices"]}},"/v3/index/trendmicro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trend Micro Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trendmicro?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_trendmicro_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"trendmicro\"","tags":["indices"]}},"/v3/index/trustwave":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trustwave Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trustwave?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_trustwave_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"trustwave\"","tags":["indices"]}},"/v3/index/twcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Taiwan CERT Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/twcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_twcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"twcert\"","tags":["indices"]}},"/v3/index/ubiquiti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubiquiti Security Advisory Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubiquiti?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ubiquiti_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ubiquiti\"","tags":["indices"]}},"/v3/index/ubuntu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ubuntu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ubuntu\"","tags":["indices"]}},"/v3/index/ubuntu-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ubuntu-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ubuntu-purls\"","tags":["indices"]}},"/v3/index/unify":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unify index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unify Product Security Advisories and Security Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unify?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_unify_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"unify\"","tags":["indices"]}},"/v3/index/unisoc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** UNISOC Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unisoc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_unisoc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"unisoc\"","tags":["indices"]}},"/v3/index/usd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** usd Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_usd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"usd\"","tags":["indices"]}},"/v3/index/usom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** USOM Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usom?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_usom_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"usom\"","tags":["indices"]}},"/v3/index/vandyke":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VanDyke Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vandyke?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vandyke_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vandyke\"","tags":["indices"]}},"/v3/index/vapidlabs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VapidLabs Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vapidlabs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vapidlabs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vapidlabs\"","tags":["indices"]}},"/v3/index/vc-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vc-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vc-cpe-dictionary_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vc-cpe-dictionary\"","tags":["indices"]}},"/v3/index/vde":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vde index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VDE CERT Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vde?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vde_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vde\"","tags":["indices"]}},"/v3/index/veeam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veeam Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veeam?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_veeam_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"veeam\"","tags":["indices"]}},"/v3/index/veritas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veritas Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veritas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_veritas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"veritas\"","tags":["indices"]}},"/v3/index/virtuozzo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Virtuozzo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/virtuozzo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_virtuozzo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"virtuozzo\"","tags":["indices"]}},"/v3/index/vlc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VLC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vlc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vlc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vlc\"","tags":["indices"]}},"/v3/index/vmware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VMWare Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vmware?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vmware_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vmware\"","tags":["indices"]}},"/v3/index/voidsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VoidSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/voidsec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_voidsec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"voidsec\"","tags":["indices"]}},"/v3/index/vulncheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck\"","tags":["indices"]}},"/v3/index/vulncheck-canaries":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (10 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-10d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-10d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-10d\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (30 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-30d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-30d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-30d\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (3 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-3d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-3d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-3d\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (90 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-90d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-90d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-90d\"","tags":["indices"]}},"/v3/index/vulncheck-config":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Configurations\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-config?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-config_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-config\"","tags":["indices"]}},"/v3/index/vulncheck-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-cvelist-v5_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-cvelist-v5\"","tags":["indices"]}},"/v3/index/vulncheck-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck KEV\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-kev?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-kev_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-kev\"","tags":["indices"]}},"/v3/index/vulncheck-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-nvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd\"","tags":["indices"]}},"/v3/index/vulncheck-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD V2\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-nvd2_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd2\"","tags":["indices"]}},"/v3/index/vulnerability-aliases":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vulnerability Aliases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnerability-aliases?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulnerability-aliases_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulnerability-aliases\"","tags":["indices"]}},"/v3/index/vulnrichment":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Vulnrichment\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnrichment?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulnrichment_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulnrichment\"","tags":["indices"]}},"/v3/index/vyaire":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vyaire Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vyaire?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vyaire_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vyaire\"","tags":["indices"]}},"/v3/index/watchguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Watchguard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/watchguard?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_watchguard_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"watchguard\"","tags":["indices"]}},"/v3/index/whatsapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WhatsApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/whatsapp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_whatsapp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"whatsapp\"","tags":["indices"]}},"/v3/index/wibu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wibu Systems Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wibu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wibu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wibu\"","tags":["indices"]}},"/v3/index/wireshark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wireshark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wireshark?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wireshark_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wireshark\"","tags":["indices"]}},"/v3/index/with-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** With Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/with-secure?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_with-secure_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"with-secure\"","tags":["indices"]}},"/v3/index/wolfi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wolfi Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wolfi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wolfi\"","tags":["indices"]}},"/v3/index/wolfssl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WolfSSL Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfssl?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wolfssl_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wolfssl\"","tags":["indices"]}},"/v3/index/wordfence":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wordfence Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wordfence?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wordfence_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wordfence\"","tags":["indices"]}},"/v3/index/xen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xen Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xen?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xen_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xen\"","tags":["indices"]}},"/v3/index/xerox":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xerox Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xerox?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xerox_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xerox\"","tags":["indices"]}},"/v3/index/xiaomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xiaomi Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xiaomi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xiaomi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xiaomi\"","tags":["indices"]}},"/v3/index/xylem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xylem Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xylem?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xylem_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xylem\"","tags":["indices"]}},"/v3/index/yamaha":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yamaha Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yamaha?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_yamaha_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"yamaha\"","tags":["indices"]}},"/v3/index/yokogawa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yokogawa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yokogawa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_yokogawa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"yokogawa\"","tags":["indices"]}},"/v3/index/yubico":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yubico Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yubico?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_yubico_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"yubico\"","tags":["indices"]}},"/v3/index/zdi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zero Day Initiative Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zdi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zdi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zdi\"","tags":["indices"]}},"/v3/index/zebra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zebra_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zebra\"","tags":["indices"]}},"/v3/index/zebra-eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra-eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra End of Life Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra-eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra-eol?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zebra-eol_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zebra-eol\"","tags":["indices"]}},"/v3/index/zeroscience":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zeroscience index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZeroScience Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zeroscience?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zeroscience?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zeroscience_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zeroscience\"","tags":["indices"]}},"/v3/index/zimbra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zimbra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zimbra Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zimbra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zimbra?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zimbra_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zimbra\"","tags":["indices"]}},"/v3/index/zoom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zoom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zoom Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zoom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zoom?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zoom_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zoom\"","tags":["indices"]}},"/v3/index/zscaler":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zscaler index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zscaler Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zscaler?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zscaler?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zscaler_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zscaler\"","tags":["indices"]}},"/v3/index/zuso":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zuso index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZUSO Vulnerability Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zuso?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zuso?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zuso_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zuso\"","tags":["indices"]}},"/v3/index/zyxel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zyxel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zyxel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zyxel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zyxel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zyxel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zyxel\"","tags":["indices"]}},"/v3/openapi":{"get":{"description":"Return the VulnCheck API (v3) OpenAPI specification","operationId":"openapi_get","responses":{"200":{"content":{"application/json":{"schema":{"additionalProperties":{},"type":"object"}}},"description":"OK"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return OpenAPI specification","tags":["endpoints"]}},"/v3/pdns/vulncheck-c2":{"get":{"description":"Retrieve a list of hostnames, identified as running Command \u0026 Control infrastructure.","operationId":"pdns_vulncheck-c2_get","parameters":[{"description":"Format of the Hostnames in the response (Defaults To: text)","in":"query","name":"format","schema":{"enum":["txt","json","text"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve a list of C2 Hostnames","tags":["endpoints"]}},"/v3/purl":{"get":{"description":"Based on the specified PURL, this endpoint will return a list of vulnerabilities that are related to the package. We currently support hex, golang, hackage, npm, and pypi","operationId":"purl_get","parameters":[{"description":"URL string used to identify and locate a software package","in":"query","name":"purl","required":true,"schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Request vulnerabilities related to a PURL","tags":["endpoints"]}},"/v3/purls":{"post":{"description":"Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities","operationId":"purls_post","requestBody":{"content":{"application/json":{"schema":{"items":{"type":"string"},"title":"purls","type":"array"}}},"description":"PURL strings used to identify and locate software packages","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Request vulnerabilities related to a list of PURLs","tags":["endpoints"]}},"/v3/rules/initial-access/{type}":{"get":{"description":"Retrieve set of initial-access detection rules by type","operationId":"rules_initial-access_type_get","parameters":[{"description":"Type of ruleset to retrieve","in":"path","name":"type","required":true,"schema":{"enum":["snort","suricata"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve set of initial-access detection rules","tags":["endpoints"]}},"/v3/tags/vulncheck-c2":{"get":{"description":"Retrieve a list of IP addresses, identified as running Command \u0026 Control infrastructure","operationId":"tags_vulncheck-c2_get","parameters":[{"description":"Format of the IP Addresses in the response (Defaults To: text)","in":"query","name":"format","schema":{"enum":["txt","json","text"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve a list of C2 IP addresses","tags":["endpoints"]}},"/v4/advisory":{"get":{"description":"Query the VulnCheck v4 advisory index","operationId":"v4QueryAdvisories","parameters":[{"description":"Filter by advisory feed name (e.g. 'vulncheck')","in":"query","name":"name","schema":{"type":"string"}},{"description":"Filter by CVE ID (e.g. 'CVE-2024-1234')","in":"query","name":"cve_id","schema":{"type":"string"}},{"description":"Filter by vendor name","in":"query","name":"vendor","schema":{"type":"string"}},{"description":"Filter by product name","in":"query","name":"product","schema":{"type":"string"}},{"description":"Filter by OS/platform","in":"query","name":"platform","schema":{"type":"string"}},{"description":"Filter by product version (semver-aware)","in":"query","name":"version","schema":{"type":"string"}},{"description":"Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*')","in":"query","name":"cpe","schema":{"type":"string"}},{"description":"Filter by package name","in":"query","name":"package_name","schema":{"type":"string"}},{"description":"Filter by package URL (PURL)","in":"query","name":"purl","schema":{"type":"string"}},{"description":"Filter by reference URL","in":"query","name":"reference_url","schema":{"type":"string"}},{"description":"Filter by reference tag (e.g. 'patch', 'advisory')","in":"query","name":"reference_tag","schema":{"type":"string"}},{"description":"Filter by description language (e.g. 'en')","in":"query","name":"description_lang","schema":{"type":"string"}},{"description":"Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d')","in":"query","name":"updatedAfter","schema":{"type":"string"}},{"description":"Return advisories updated before this date (RFC3339 or date-math)","in":"query","name":"updatedBefore","schema":{"type":"string"}},{"description":"Page number (default: 1)","in":"query","name":"page","schema":{"type":"integer"}},{"description":"Results per page, max 100 (default: 10)","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"Presence activates cursor mode from the first page (value is ignored; cannot be combined with page)","in":"query","name":"start_cursor","schema":{"type":"string"}},{"description":"Cursor from previous response _meta.next_cursor to fetch the next page","in":"query","name":"cursor","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.V4AdvisoryReturnValue"}}},"description":"OK"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Bad Request"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Unauthorized"},"402":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Payment Required"},"503":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Query advisories","tags":["advisory"]}},"/v4/advisory/list":{"get":{"description":"Return a list of available advisory feed names","operationId":"v4ListAdvisoryFeeds","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.V4ListFeedReturnValue"}}},"description":"OK"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Bad Request"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Unauthorized"},"402":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Payment Required"},"503":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"List advisory feeds","tags":["advisory"]}},"/v4/backup":{"get":{"description":"Returns the list of advisory feeds for which a backup can be requested","operationId":"v4ListBackups","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/backup.ListBackupsResponse"}}},"description":"OK"},"401":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Unauthorized"},"503":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"List available backups","tags":["backup"]}},"/v4/backup/{index}":{"get":{"description":"Validates the feed, generates a fresh backup zip if the source parquet is newer, and returns a pre-signed download URL","operationId":"v4GetBackupByName","parameters":[{"description":"Feed name (e.g. 'vulncheck')","in":"path","name":"index","required":true,"schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/backup.BackupResponse"}}},"description":"OK"},"401":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Unauthorized"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"503":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Get backup by feed name","tags":["backup"]}}},"servers":[{"url":"https://api.vulncheck.com"}]} \ No newline at end of file diff --git a/poetry.lock b/poetry.lock index 69565cd0..1d1ef282 100644 --- a/poetry.lock +++ b/poetry.lock @@ -14,132 +14,132 @@ files = [ [[package]] name = "aiohttp" -version = "3.13.4" +version = "3.13.5" description = "Async http client/server framework (asyncio)" optional = false python-versions = ">=3.9" groups = ["main"] files = [ - {file = "aiohttp-3.13.4-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:6290fe12fe8cefa6ea3c1c5b969d32c010dfe191d4392ff9b599a3f473cbe722"}, - {file = "aiohttp-3.13.4-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:7520d92c0e8fbbe63f36f20a5762db349ff574ad38ad7bc7732558a650439845"}, - {file = "aiohttp-3.13.4-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:d2710ae1e1b81d0f187883b6e9d66cecf8794b50e91aa1e73fc78bfb5503b5d9"}, - {file = "aiohttp-3.13.4-cp310-cp310-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:717d17347567ded1e273aa09918650dfd6fd06f461549204570c7973537d4123"}, - {file = "aiohttp-3.13.4-cp310-cp310-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:383880f7b8de5ac208fa829c7038d08e66377283b2de9e791b71e06e803153c2"}, - {file = "aiohttp-3.13.4-cp310-cp310-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:1867087e2c1963db1216aedf001efe3b129835ed2b05d97d058176a6d08b5726"}, - {file = "aiohttp-3.13.4-cp310-cp310-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:6234bf416a38d687c3ab7f79934d7fb2a42117a5b9813aca07de0a5398489023"}, - {file = "aiohttp-3.13.4-cp310-cp310-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:3cdd3393130bf6588962441ffd5bde1d3ea2d63a64afa7119b3f3ba349cebbe7"}, - {file = "aiohttp-3.13.4-cp310-cp310-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:0d0dbc6c76befa76865373d6aa303e480bb8c3486e7763530f7f6e527b471118"}, - {file = "aiohttp-3.13.4-cp310-cp310-musllinux_1_2_aarch64.whl", hash = "sha256:10fb7b53262cf4144a083c9db0d2b4d22823d6708270a9970c4627b248c6064c"}, - {file = "aiohttp-3.13.4-cp310-cp310-musllinux_1_2_armv7l.whl", hash = "sha256:eb10ce8c03850e77f4d9518961c227be569e12f71525a7e90d17bca04299921d"}, - {file = "aiohttp-3.13.4-cp310-cp310-musllinux_1_2_ppc64le.whl", hash = "sha256:7c65738ac5ae32b8feef699a4ed0dc91a0c8618b347781b7461458bbcaaac7eb"}, - {file = "aiohttp-3.13.4-cp310-cp310-musllinux_1_2_riscv64.whl", hash = "sha256:6b335919ffbaf98df8ff3c74f7a6decb8775882632952fd1810a017e38f15aee"}, - {file = "aiohttp-3.13.4-cp310-cp310-musllinux_1_2_s390x.whl", hash = "sha256:ec75fc18cb9f4aca51c2cbace20cf6716e36850f44189644d2d69a875d5e0532"}, - {file = "aiohttp-3.13.4-cp310-cp310-musllinux_1_2_x86_64.whl", hash = "sha256:463fa18a95c5a635d2b8c09babe240f9d7dbf2a2010a6c0b35d8c4dff2a0e819"}, - {file = "aiohttp-3.13.4-cp310-cp310-win32.whl", hash = "sha256:13168f5645d9045522c6cef818f54295376257ed8d02513a37c2ef3046fc7a97"}, - {file = "aiohttp-3.13.4-cp310-cp310-win_amd64.whl", hash = "sha256:a7058af1f53209fdf07745579ced525d38d481650a989b7aa4a3b484b901cdab"}, - {file = "aiohttp-3.13.4-cp311-cp311-macosx_10_9_universal2.whl", hash = "sha256:8ea0c64d1bcbf201b285c2246c51a0c035ba3bbd306640007bc5844a3b4658c1"}, - {file = "aiohttp-3.13.4-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:6f742e1fa45c0ed522b00ede565e18f97e4cf8d1883a712ac42d0339dfb0cce7"}, - {file = "aiohttp-3.13.4-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:6dcfb50ee25b3b7a1222a9123be1f9f89e56e67636b561441f0b304e25aaef8f"}, - {file = "aiohttp-3.13.4-cp311-cp311-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:3262386c4ff370849863ea93b9ea60fd59c6cf56bf8f93beac625cf4d677c04d"}, - {file = "aiohttp-3.13.4-cp311-cp311-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:473bb5aa4218dd254e9ae4834f20e31f5a0083064ac0136a01a62ddbae2eaa42"}, - {file = "aiohttp-3.13.4-cp311-cp311-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:e56423766399b4c77b965f6aaab6c9546617b8994a956821cc507d00b91d978c"}, - {file = "aiohttp-3.13.4-cp311-cp311-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:8af249343fafd5ad90366a16d230fc265cf1149f26075dc9fe93cfd7c7173942"}, - {file = "aiohttp-3.13.4-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:0bc0a5cf4f10ef5a2c94fdde488734b582a3a7a000b131263e27c9295bd682d9"}, - {file = "aiohttp-3.13.4-cp311-cp311-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:5c7ff1028e3c9fc5123a865ce17df1cb6424d180c503b8517afbe89aa566e6be"}, - {file = "aiohttp-3.13.4-cp311-cp311-musllinux_1_2_aarch64.whl", hash = "sha256:ba5cf98b5dcb9bddd857da6713a503fa6d341043258ca823f0f5ab7ab4a94ee8"}, - {file = "aiohttp-3.13.4-cp311-cp311-musllinux_1_2_armv7l.whl", hash = "sha256:d85965d3ba21ee4999e83e992fecb86c4614d6920e40705501c0a1f80a583c12"}, - {file = "aiohttp-3.13.4-cp311-cp311-musllinux_1_2_ppc64le.whl", hash = "sha256:49f0b18a9b05d79f6f37ddd567695943fcefb834ef480f17a4211987302b2dc7"}, - {file = "aiohttp-3.13.4-cp311-cp311-musllinux_1_2_riscv64.whl", hash = "sha256:7f78cb080c86fbf765920e5f1ef35af3f24ec4314d6675d0a21eaf41f6f2679c"}, - {file = "aiohttp-3.13.4-cp311-cp311-musllinux_1_2_s390x.whl", hash = "sha256:67a3ec705534a614b68bbf1c70efa777a21c3da3895d1c44510a41f5a7ae0453"}, - {file = "aiohttp-3.13.4-cp311-cp311-musllinux_1_2_x86_64.whl", hash = "sha256:d6630ec917e85c5356b2295744c8a97d40f007f96a1c76bf1928dc2e27465393"}, - {file = "aiohttp-3.13.4-cp311-cp311-win32.whl", hash = "sha256:54049021bc626f53a5394c29e8c444f726ee5a14b6e89e0ad118315b1f90f5e3"}, - {file = "aiohttp-3.13.4-cp311-cp311-win_amd64.whl", hash = "sha256:c033f2bc964156030772d31cbf7e5defea181238ce1f87b9455b786de7d30145"}, - {file = "aiohttp-3.13.4-cp312-cp312-macosx_10_13_universal2.whl", hash = "sha256:ee62d4471ce86b108b19c3364db4b91180d13fe3510144872d6bad5401957360"}, - {file = "aiohttp-3.13.4-cp312-cp312-macosx_10_13_x86_64.whl", hash = "sha256:c0fd8f41b54b58636402eb493afd512c23580456f022c1ba2db0f810c959ed0d"}, - {file = "aiohttp-3.13.4-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:4baa48ce49efd82d6b1a0be12d6a36b35e5594d1dd42f8bfba96ea9f8678b88c"}, - {file = "aiohttp-3.13.4-cp312-cp312-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:d738ebab9f71ee652d9dbd0211057690022201b11197f9a7324fd4dba128aa97"}, - {file = "aiohttp-3.13.4-cp312-cp312-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:0ce692c3468fa831af7dceed52edf51ac348cebfc8d3feb935927b63bd3e8576"}, - {file = "aiohttp-3.13.4-cp312-cp312-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:8e08abcfe752a454d2cb89ff0c08f2d1ecd057ae3e8cc6d84638de853530ebab"}, - {file = "aiohttp-3.13.4-cp312-cp312-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:5977f701b3fff36367a11087f30ea73c212e686d41cd363c50c022d48b011d8d"}, - {file = "aiohttp-3.13.4-cp312-cp312-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:54203e10405c06f8b6020bd1e076ae0fe6c194adcee12a5a78af3ffa3c57025e"}, - {file = "aiohttp-3.13.4-cp312-cp312-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:358a6af0145bc4dda037f13167bef3cce54b132087acc4c295c739d05d16b1c3"}, - {file = "aiohttp-3.13.4-cp312-cp312-musllinux_1_2_aarch64.whl", hash = "sha256:898ea1850656d7d61832ef06aa9846ab3ddb1621b74f46de78fbc5e1a586ba83"}, - {file = "aiohttp-3.13.4-cp312-cp312-musllinux_1_2_armv7l.whl", hash = "sha256:7bc30cceb710cf6a44e9617e43eebb6e3e43ad855a34da7b4b6a73537d8a6763"}, - {file = "aiohttp-3.13.4-cp312-cp312-musllinux_1_2_ppc64le.whl", hash = "sha256:4a31c0c587a8a038f19a4c7e60654a6c899c9de9174593a13e7cc6e15ff271f9"}, - {file = "aiohttp-3.13.4-cp312-cp312-musllinux_1_2_riscv64.whl", hash = "sha256:2062f675f3fe6e06d6113eb74a157fb9df58953ffed0cdb4182554b116545758"}, - {file = "aiohttp-3.13.4-cp312-cp312-musllinux_1_2_s390x.whl", hash = "sha256:3d1ba8afb847ff80626d5e408c1fdc99f942acc877d0702fe137015903a220a9"}, - {file = "aiohttp-3.13.4-cp312-cp312-musllinux_1_2_x86_64.whl", hash = "sha256:b08149419994cdd4d5eecf7fd4bc5986b5a9380285bcd01ab4c0d6bfca47b79d"}, - {file = "aiohttp-3.13.4-cp312-cp312-win32.whl", hash = "sha256:fc432f6a2c4f720180959bc19aa37259651c1a4ed8af8afc84dd41c60f15f791"}, - {file = "aiohttp-3.13.4-cp312-cp312-win_amd64.whl", hash = "sha256:6148c9ae97a3e8bff9a1fc9c757fa164116f86c100468339730e717590a3fb77"}, - {file = "aiohttp-3.13.4-cp313-cp313-macosx_10_13_universal2.whl", hash = "sha256:63dd5e5b1e43b8fb1e91b79b7ceba1feba588b317d1edff385084fcc7a0a4538"}, - {file = "aiohttp-3.13.4-cp313-cp313-macosx_10_13_x86_64.whl", hash = "sha256:746ac3cc00b5baea424dacddea3ec2c2702f9590de27d837aa67004db1eebc6e"}, - {file = "aiohttp-3.13.4-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:bda8f16ea99d6a6705e5946732e48487a448be874e54a4f73d514660ff7c05d3"}, - {file = "aiohttp-3.13.4-cp313-cp313-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:4b061e7b5f840391e3f64d0ddf672973e45c4cfff7a0feea425ea24e51530fc2"}, - {file = "aiohttp-3.13.4-cp313-cp313-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:b252e8d5cd66184b570d0d010de742736e8a4fab22c58299772b0c5a466d4b21"}, - {file = "aiohttp-3.13.4-cp313-cp313-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:20af8aad61d1803ff11152a26146d8d81c266aa8c5aa9b4504432abb965c36a0"}, - {file = "aiohttp-3.13.4-cp313-cp313-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:13a5cc924b59859ad2adb1478e31f410a7ed46e92a2a619d6d1dd1a63c1a855e"}, - {file = "aiohttp-3.13.4-cp313-cp313-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:534913dfb0a644d537aebb4123e7d466d94e3be5549205e6a31f72368980a81a"}, - {file = "aiohttp-3.13.4-cp313-cp313-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:320e40192a2dcc1cf4b5576936e9652981ab596bf81eb309535db7e2f5b5672f"}, - {file = "aiohttp-3.13.4-cp313-cp313-musllinux_1_2_aarch64.whl", hash = "sha256:9e587fcfce2bcf06526a43cb705bdee21ac089096f2e271d75de9c339db3100c"}, - {file = "aiohttp-3.13.4-cp313-cp313-musllinux_1_2_armv7l.whl", hash = "sha256:9eb9c2eea7278206b5c6c1441fdd9dc420c278ead3f3b2cc87f9b693698cc500"}, - {file = "aiohttp-3.13.4-cp313-cp313-musllinux_1_2_ppc64le.whl", hash = "sha256:29be00c51972b04bf9d5c8f2d7f7314f48f96070ca40a873a53056e652e805f7"}, - {file = "aiohttp-3.13.4-cp313-cp313-musllinux_1_2_riscv64.whl", hash = "sha256:90c06228a6c3a7c9f776fe4fc0b7ff647fffd3bed93779a6913c804ae00c1073"}, - {file = "aiohttp-3.13.4-cp313-cp313-musllinux_1_2_s390x.whl", hash = "sha256:a533ec132f05fd9a1d959e7f34184cd7d5e8511584848dab85faefbaac573069"}, - {file = "aiohttp-3.13.4-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:1c946f10f413836f82ea4cfb90200d2a59578c549f00857e03111cf45ad01ca5"}, - {file = "aiohttp-3.13.4-cp313-cp313-win32.whl", hash = "sha256:48708e2706106da6967eff5908c78ca3943f005ed6bcb75da2a7e4da94ef8c70"}, - {file = "aiohttp-3.13.4-cp313-cp313-win_amd64.whl", hash = "sha256:74a2eb058da44fa3a877a49e2095b591d4913308bb424c418b77beb160c55ce3"}, - {file = "aiohttp-3.13.4-cp314-cp314-macosx_10_13_universal2.whl", hash = "sha256:e0a2c961fc92abeff61d6444f2ce6ad35bb982db9fc8ff8a47455beacf454a57"}, - {file = "aiohttp-3.13.4-cp314-cp314-macosx_10_13_x86_64.whl", hash = "sha256:153274535985a0ff2bff1fb6c104ed547cec898a09213d21b0f791a44b14d933"}, - {file = "aiohttp-3.13.4-cp314-cp314-macosx_11_0_arm64.whl", hash = "sha256:351f3171e2458da3d731ce83f9e6b9619e325c45cbd534c7759750cabf453ad7"}, - {file = "aiohttp-3.13.4-cp314-cp314-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:f989ac8bc5595ff761a5ccd32bdb0768a117f36dd1504b1c2c074ed5d3f4df9c"}, - {file = "aiohttp-3.13.4-cp314-cp314-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:d36fc1709110ec1e87a229b201dd3ddc32aa01e98e7868083a794609b081c349"}, - {file = "aiohttp-3.13.4-cp314-cp314-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:42adaeea83cbdf069ab94f5103ce0787c21fb1a0153270da76b59d5578302329"}, - {file = "aiohttp-3.13.4-cp314-cp314-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:92deb95469928cc41fd4b42a95d8012fa6df93f6b1c0a83af0ffbc4a5e218cde"}, - {file = "aiohttp-3.13.4-cp314-cp314-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:0c0c7c07c4257ef3a1df355f840bc62d133bcdef5c1c5ba75add3c08553e2eed"}, - {file = "aiohttp-3.13.4-cp314-cp314-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:f062c45de8a1098cb137a1898819796a2491aec4e637a06b03f149315dff4d8f"}, - {file = "aiohttp-3.13.4-cp314-cp314-musllinux_1_2_aarch64.whl", hash = "sha256:76093107c531517001114f0ebdb4f46858ce818590363e3e99a4a2280334454a"}, - {file = "aiohttp-3.13.4-cp314-cp314-musllinux_1_2_armv7l.whl", hash = "sha256:6f6ec32162d293b82f8b63a16edc80769662fbd5ae6fbd4936d3206a2c2cc63b"}, - {file = "aiohttp-3.13.4-cp314-cp314-musllinux_1_2_ppc64le.whl", hash = "sha256:5903e2db3d202a00ad9f0ec35a122c005e85d90c9836ab4cda628f01edf425e2"}, - {file = "aiohttp-3.13.4-cp314-cp314-musllinux_1_2_riscv64.whl", hash = "sha256:2d5bea57be7aca98dbbac8da046d99b5557c5cf4e28538c4c786313078aca09e"}, - {file = "aiohttp-3.13.4-cp314-cp314-musllinux_1_2_s390x.whl", hash = "sha256:bcf0c9902085976edc0232b75006ef38f89686901249ce14226b6877f88464fb"}, - {file = "aiohttp-3.13.4-cp314-cp314-musllinux_1_2_x86_64.whl", hash = "sha256:c3295f98bfeed2e867cab588f2a146a9db37a85e3ae9062abf46ba062bd29165"}, - {file = "aiohttp-3.13.4-cp314-cp314-win32.whl", hash = "sha256:a598a5c5767e1369d8f5b08695cab1d8160040f796c4416af76fd773d229b3c9"}, - {file = "aiohttp-3.13.4-cp314-cp314-win_amd64.whl", hash = "sha256:c555db4bc7a264bead5a7d63d92d41a1122fcd39cc62a4db815f45ad46f9c2c8"}, - {file = "aiohttp-3.13.4-cp314-cp314t-macosx_10_13_universal2.whl", hash = "sha256:45abbbf09a129825d13c18c7d3182fecd46d9da3cfc383756145394013604ac1"}, - {file = "aiohttp-3.13.4-cp314-cp314t-macosx_10_13_x86_64.whl", hash = "sha256:74c80b2bc2c2adb7b3d1941b2b60701ee2af8296fc8aad8b8bc48bc25767266c"}, - {file = "aiohttp-3.13.4-cp314-cp314t-macosx_11_0_arm64.whl", hash = "sha256:c97989ae40a9746650fa196894f317dafc12227c808c774929dda0ff873a5954"}, - {file = "aiohttp-3.13.4-cp314-cp314t-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:dae86be9811493f9990ef44fff1685f5c1a3192e9061a71a109d527944eed551"}, - {file = "aiohttp-3.13.4-cp314-cp314t-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:1db491abe852ca2fa6cc48a3341985b0174b3741838e1341b82ac82c8bd9e871"}, - {file = "aiohttp-3.13.4-cp314-cp314t-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:0e5d701c0aad02a7dce72eef6b93226cf3734330f1a31d69ebbf69f33b86666e"}, - {file = "aiohttp-3.13.4-cp314-cp314t-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:8ac32a189081ae0a10ba18993f10f338ec94341f0d5df8fff348043962f3c6f8"}, - {file = "aiohttp-3.13.4-cp314-cp314t-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:98e968cdaba43e45c73c3f306fca418c8009a957733bac85937c9f9cf3f4de27"}, - {file = "aiohttp-3.13.4-cp314-cp314t-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:ca114790c9144c335d538852612d3e43ea0f075288f4849cf4b05d6cd2238ce7"}, - {file = "aiohttp-3.13.4-cp314-cp314t-musllinux_1_2_aarch64.whl", hash = "sha256:ea2e071661ba9cfe11eabbc81ac5376eaeb3061f6e72ec4cc86d7cdd1ffbdbbb"}, - {file = "aiohttp-3.13.4-cp314-cp314t-musllinux_1_2_armv7l.whl", hash = "sha256:34e89912b6c20e0fd80e07fa401fd218a410aa1ce9f1c2f1dad6db1bd0ce0927"}, - {file = "aiohttp-3.13.4-cp314-cp314t-musllinux_1_2_ppc64le.whl", hash = "sha256:0e217cf9f6a42908c52b46e42c568bd57adc39c9286ced31aaace614b6087965"}, - {file = "aiohttp-3.13.4-cp314-cp314t-musllinux_1_2_riscv64.whl", hash = "sha256:0c296f1221e21ba979f5ac1964c3b78cfde15c5c5f855ffd2caab337e9cd9182"}, - {file = "aiohttp-3.13.4-cp314-cp314t-musllinux_1_2_s390x.whl", hash = "sha256:d99a9d168ebaffb74f36d011750e490085ac418f4db926cce3989c8fe6cb6b1b"}, - {file = "aiohttp-3.13.4-cp314-cp314t-musllinux_1_2_x86_64.whl", hash = "sha256:cb19177205d93b881f3f89e6081593676043a6828f59c78c17a0fd6c1fbed2ba"}, - {file = "aiohttp-3.13.4-cp314-cp314t-win32.whl", hash = "sha256:c606aa5656dab6552e52ca368e43869c916338346bfaf6304e15c58fb113ea30"}, - {file = "aiohttp-3.13.4-cp314-cp314t-win_amd64.whl", hash = "sha256:014dcc10ec8ab8db681f0d68e939d1e9286a5aa2b993cbbdb0db130853e02144"}, - {file = "aiohttp-3.13.4-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:b3f00bb9403728b08eb3951e982ca0a409c7a871d709684623daeab79465b181"}, - {file = "aiohttp-3.13.4-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:cb15595eb52870f84248d7cc97013a76f52ab02ff74d394be093b1d9b8b82bc0"}, - {file = "aiohttp-3.13.4-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:907ad36b6a65cff7d88d7aca0f77c650546ba850a4f92c92ecb83590d4613249"}, - {file = "aiohttp-3.13.4-cp39-cp39-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:5539ec0d6a3a5c6799b661b7e79166ad1b7ae71ccb59a92fcb6b4ef89295bc94"}, - {file = "aiohttp-3.13.4-cp39-cp39-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:3b4e07d8803a70dd886b5f38588e5b49f894995ca8e132b06c31a2583ae2ef6e"}, - {file = "aiohttp-3.13.4-cp39-cp39-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:ce7320a945aac4bf0bb8901600e4f9409eb602f25ce3ef4d275b48f6d704a862"}, - {file = "aiohttp-3.13.4-cp39-cp39-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:26ed03f7d3d6453634729e2c7600d7255d65e879559c5a48fe1bb78355cde74b"}, - {file = "aiohttp-3.13.4-cp39-cp39-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:4c3f733916e85506b8000dddc071c6b82f8c68f56c99adb328d6550017db062d"}, - {file = "aiohttp-3.13.4-cp39-cp39-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:b3d525648fe7c8b4977e460c18098f9f81d7991d72edfdc2f13cf96068f279bc"}, - {file = "aiohttp-3.13.4-cp39-cp39-musllinux_1_2_aarch64.whl", hash = "sha256:4e2e68085730a03704beb2cff035fa8648f62c9f93758d7e6d70add7f7bb5b3b"}, - {file = "aiohttp-3.13.4-cp39-cp39-musllinux_1_2_armv7l.whl", hash = "sha256:797613182ffaaca0b9ad5f3b3d3ce5d21242c768f75e66c750b8292bd97c9de3"}, - {file = "aiohttp-3.13.4-cp39-cp39-musllinux_1_2_ppc64le.whl", hash = "sha256:2d15e7e4f1099d9e4d863eaf77a8eee5dcb002b7d7188061b0fbee37f845899e"}, - {file = "aiohttp-3.13.4-cp39-cp39-musllinux_1_2_riscv64.whl", hash = "sha256:19f60011ad60e40a01d242238bb335399e3a4d8df958c63cbb835add8d5c3b5a"}, - {file = "aiohttp-3.13.4-cp39-cp39-musllinux_1_2_s390x.whl", hash = "sha256:c344c47e85678e410b064fc2ace14db86bb69db7ed5520c234bf13aed603ec30"}, - {file = "aiohttp-3.13.4-cp39-cp39-musllinux_1_2_x86_64.whl", hash = "sha256:d904084985ca66459e93797e5e05985c048a9c0633655331144c089943e53d12"}, - {file = "aiohttp-3.13.4-cp39-cp39-win32.whl", hash = "sha256:1746338dc2a33cf706cd7446575d13d451f28f9860bebc908c7632b22e71ae3f"}, - {file = "aiohttp-3.13.4-cp39-cp39-win_amd64.whl", hash = "sha256:a5444dce2e6fba0a1dc2d58d026e674f25f21de178c6f844342629bcef019f2f"}, - {file = "aiohttp-3.13.4.tar.gz", hash = "sha256:d97a6d09c66087890c2ab5d49069e1e570583f7ac0314ecf98294c1b6aaebd38"}, + {file = "aiohttp-3.13.5-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:02222e7e233295f40e011c1b00e3b0bd451f22cf853a0304c3595633ee47da4b"}, + {file = "aiohttp-3.13.5-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:bace460460ed20614fa6bc8cb09966c0b8517b8c58ad8046828c6078d25333b5"}, + {file = "aiohttp-3.13.5-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:8f546a4dc1e6a5edbb9fd1fd6ad18134550e096a5a43f4ad74acfbd834fc6670"}, + {file = "aiohttp-3.13.5-cp310-cp310-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:c86969d012e51b8e415a8c6ce96f7857d6a87d6207303ab02d5d11ef0cad2274"}, + {file = "aiohttp-3.13.5-cp310-cp310-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:b6f6cd1560c5fa427e3b6074bb24d2c64e225afbb7165008903bd42e4e33e28a"}, + {file = "aiohttp-3.13.5-cp310-cp310-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:636bc362f0c5bbc7372bc3ae49737f9e3030dbce469f0f422c8f38079780363d"}, + {file = "aiohttp-3.13.5-cp310-cp310-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:6a7cbeb06d1070f1d14895eeeed4dac5913b22d7b456f2eb969f11f4b3993796"}, + {file = "aiohttp-3.13.5-cp310-cp310-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:bca9ef7517fd7874a1a08970ae88f497bf5c984610caa0bf40bd7e8450852b95"}, + {file = "aiohttp-3.13.5-cp310-cp310-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:019a67772e034a0e6b9b17c13d0a8fe56ad9fb150fc724b7f3ffd3724288d9e5"}, + {file = "aiohttp-3.13.5-cp310-cp310-musllinux_1_2_aarch64.whl", hash = "sha256:f34ecee82858e41dd217734f0c41a532bd066bcaab636ad830f03a30b2a96f2a"}, + {file = "aiohttp-3.13.5-cp310-cp310-musllinux_1_2_armv7l.whl", hash = "sha256:4eac02d9af4813ee289cd63a361576da36dba57f5a1ab36377bc2600db0cbb73"}, + {file = "aiohttp-3.13.5-cp310-cp310-musllinux_1_2_ppc64le.whl", hash = "sha256:4beac52e9fe46d6abf98b0176a88154b742e878fdf209d2248e99fcdf73cd297"}, + {file = "aiohttp-3.13.5-cp310-cp310-musllinux_1_2_riscv64.whl", hash = "sha256:c180f480207a9b2475f2b8d8bd7204e47aec952d084b2a2be58a782ffcf96074"}, + {file = "aiohttp-3.13.5-cp310-cp310-musllinux_1_2_s390x.whl", hash = "sha256:2837fb92951564d6339cedae4a7231692aa9f73cbc4fb2e04263b96844e03b4e"}, + {file = "aiohttp-3.13.5-cp310-cp310-musllinux_1_2_x86_64.whl", hash = "sha256:d9010032a0b9710f58012a1e9c222528763d860ba2ee1422c03473eab47703e7"}, + {file = "aiohttp-3.13.5-cp310-cp310-win32.whl", hash = "sha256:7c4b6668b2b2b9027f209ddf647f2a4407784b5d88b8be4efcc72036f365baf9"}, + {file = "aiohttp-3.13.5-cp310-cp310-win_amd64.whl", hash = "sha256:cd3db5927bf9167d5a6157ddb2f036f6b6b0ad001ac82355d43e97a4bde76d76"}, + {file = "aiohttp-3.13.5-cp311-cp311-macosx_10_9_universal2.whl", hash = "sha256:7ab7229b6f9b5c1ba4910d6c41a9eb11f543eadb3f384df1b4c293f4e73d44d6"}, + {file = "aiohttp-3.13.5-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:8f14c50708bb156b3a3ca7230b3d820199d56a48e3af76fa21c2d6087190fe3d"}, + {file = "aiohttp-3.13.5-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:e7d2f8616f0ff60bd332022279011776c3ac0faa0f1b463f7bb12326fbc97a1c"}, + {file = "aiohttp-3.13.5-cp311-cp311-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:a2567b72e1ffc3ab25510db43f355b29eeada56c0a622e58dcdb19530eb0a3cb"}, + {file = "aiohttp-3.13.5-cp311-cp311-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:fb0540c854ac9c0c5ad495908fdfd3e332d553ec731698c0e29b1877ba0d2ec6"}, + {file = "aiohttp-3.13.5-cp311-cp311-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:c9883051c6972f58bfc4ebb2116345ee2aa151178e99c3f2b2bbe2af712abd13"}, + {file = "aiohttp-3.13.5-cp311-cp311-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:2294172ce08a82fb7c7273485895de1fa1186cc8294cfeb6aef4af42ad261174"}, + {file = "aiohttp-3.13.5-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:3a807cabd5115fb55af198b98178997a5e0e57dead43eb74a93d9c07d6d4a7dc"}, + {file = "aiohttp-3.13.5-cp311-cp311-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:aa6d0d932e0f39c02b80744273cd5c388a2d9bc07760a03164f229c8e02662f6"}, + {file = "aiohttp-3.13.5-cp311-cp311-musllinux_1_2_aarch64.whl", hash = "sha256:60869c7ac4aaabe7110f26499f3e6e5696eae98144735b12a9c3d9eae2b51a49"}, + {file = "aiohttp-3.13.5-cp311-cp311-musllinux_1_2_armv7l.whl", hash = "sha256:26d2f8546f1dfa75efa50c3488215a903c0168d253b75fba4210f57ab77a0fb8"}, + {file = "aiohttp-3.13.5-cp311-cp311-musllinux_1_2_ppc64le.whl", hash = "sha256:f1162a1492032c82f14271e831c8f4b49f2b6078f4f5fc74de2c912fa225d51d"}, + {file = "aiohttp-3.13.5-cp311-cp311-musllinux_1_2_riscv64.whl", hash = "sha256:8b14eb3262fad0dc2f89c1a43b13727e709504972186ff6a99a3ecaa77102b6c"}, + {file = "aiohttp-3.13.5-cp311-cp311-musllinux_1_2_s390x.whl", hash = "sha256:ca9ac61ac6db4eb6c2a0cd1d0f7e1357647b638ccc92f7e9d8d133e71ed3c6ac"}, + {file = "aiohttp-3.13.5-cp311-cp311-musllinux_1_2_x86_64.whl", hash = "sha256:7996023b2ed59489ae4762256c8516df9820f751cf2c5da8ed2fb20ee50abab3"}, + {file = "aiohttp-3.13.5-cp311-cp311-win32.whl", hash = "sha256:77dfa48c9f8013271011e51c00f8ada19851f013cde2c48fca1ba5e0caf5bb06"}, + {file = "aiohttp-3.13.5-cp311-cp311-win_amd64.whl", hash = "sha256:d3a4834f221061624b8887090637db9ad4f61752001eae37d56c52fddade2dc8"}, + {file = "aiohttp-3.13.5-cp312-cp312-macosx_10_13_universal2.whl", hash = "sha256:023ecba036ddd840b0b19bf195bfae970083fd7024ce1ac22e9bba90464620e9"}, + {file = "aiohttp-3.13.5-cp312-cp312-macosx_10_13_x86_64.whl", hash = "sha256:15c933ad7920b7d9a20de151efcd05a6e38302cbf0e10c9b2acb9a42210a2416"}, + {file = "aiohttp-3.13.5-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:ab2899f9fa2f9f741896ebb6fa07c4c883bfa5c7f2ddd8cf2aafa86fa981b2d2"}, + {file = "aiohttp-3.13.5-cp312-cp312-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:a60eaa2d440cd4707696b52e40ed3e2b0f73f65be07fd0ef23b6b539c9c0b0b4"}, + {file = "aiohttp-3.13.5-cp312-cp312-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:55b3bdd3292283295774ab585160c4004f4f2f203946997f49aac032c84649e9"}, + {file = "aiohttp-3.13.5-cp312-cp312-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:c2b2355dc094e5f7d45a7bb262fe7207aa0460b37a0d87027dcf21b5d890e7d5"}, + {file = "aiohttp-3.13.5-cp312-cp312-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:b38765950832f7d728297689ad78f5f2cf79ff82487131c4d26fe6ceecdc5f8e"}, + {file = "aiohttp-3.13.5-cp312-cp312-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:b18f31b80d5a33661e08c89e202edabf1986e9b49c42b4504371daeaa11b47c1"}, + {file = "aiohttp-3.13.5-cp312-cp312-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:33add2463dde55c4f2d9635c6ab33ce154e5ecf322bd26d09af95c5f81cfa286"}, + {file = "aiohttp-3.13.5-cp312-cp312-musllinux_1_2_aarch64.whl", hash = "sha256:327cc432fdf1356fb4fbc6fe833ad4e9f6aacb71a8acaa5f1855e4b25910e4a9"}, + {file = "aiohttp-3.13.5-cp312-cp312-musllinux_1_2_armv7l.whl", hash = "sha256:7c35b0bf0b48a70b4cb4fc5d7bed9b932532728e124874355de1a0af8ec4bc88"}, + {file = "aiohttp-3.13.5-cp312-cp312-musllinux_1_2_ppc64le.whl", hash = "sha256:df23d57718f24badef8656c49743e11a89fd6f5358fa8a7b96e728fda2abf7d3"}, + {file = "aiohttp-3.13.5-cp312-cp312-musllinux_1_2_riscv64.whl", hash = "sha256:02e048037a6501a5ec1f6fc9736135aec6eb8a004ce48838cb951c515f32c80b"}, + {file = "aiohttp-3.13.5-cp312-cp312-musllinux_1_2_s390x.whl", hash = "sha256:31cebae8b26f8a615d2b546fee45d5ffb76852ae6450e2a03f42c9102260d6fe"}, + {file = "aiohttp-3.13.5-cp312-cp312-musllinux_1_2_x86_64.whl", hash = "sha256:888e78eb5ca55a615d285c3c09a7a91b42e9dd6fc699b166ebd5dee87c9ccf14"}, + {file = "aiohttp-3.13.5-cp312-cp312-win32.whl", hash = "sha256:8bd3ec6376e68a41f9f95f5ed170e2fcf22d4eb27a1f8cb361d0508f6e0557f3"}, + {file = "aiohttp-3.13.5-cp312-cp312-win_amd64.whl", hash = "sha256:110e448e02c729bcebb18c60b9214a87ba33bac4a9fa5e9a5f139938b56c6cb1"}, + {file = "aiohttp-3.13.5-cp313-cp313-macosx_10_13_universal2.whl", hash = "sha256:a5029cc80718bbd545123cd8fe5d15025eccaaaace5d0eeec6bd556ad6163d61"}, + {file = "aiohttp-3.13.5-cp313-cp313-macosx_10_13_x86_64.whl", hash = "sha256:4bb6bf5811620003614076bdc807ef3b5e38244f9d25ca5fe888eaccea2a9832"}, + {file = "aiohttp-3.13.5-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:a84792f8631bf5a94e52d9cc881c0b824ab42717165a5579c760b830d9392ac9"}, + {file = "aiohttp-3.13.5-cp313-cp313-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:57653eac22c6a4c13eb22ecf4d673d64a12f266e72785ab1c8b8e5940d0e8090"}, + {file = "aiohttp-3.13.5-cp313-cp313-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:e5e5f7debc7a57af53fdf5c5009f9391d9f4c12867049d509bf7bb164a6e295b"}, + {file = "aiohttp-3.13.5-cp313-cp313-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:c719f65bebcdf6716f10e9eff80d27567f7892d8988c06de12bbbd39307c6e3a"}, + {file = "aiohttp-3.13.5-cp313-cp313-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:d97f93fdae594d886c5a866636397e2bcab146fd7a132fd6bb9ce182224452f8"}, + {file = "aiohttp-3.13.5-cp313-cp313-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:3df334e39d4c2f899a914f1dba283c1aadc311790733f705182998c6f7cae665"}, + {file = "aiohttp-3.13.5-cp313-cp313-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:fe6970addfea9e5e081401bcbadf865d2b6da045472f58af08427e108d618540"}, + {file = "aiohttp-3.13.5-cp313-cp313-musllinux_1_2_aarch64.whl", hash = "sha256:7becdf835feff2f4f335d7477f121af787e3504b48b449ff737afb35869ba7bb"}, + {file = "aiohttp-3.13.5-cp313-cp313-musllinux_1_2_armv7l.whl", hash = "sha256:676e5651705ad5d8a70aeb8eb6936c436d8ebbd56e63436cb7dd9bb36d2a9a46"}, + {file = "aiohttp-3.13.5-cp313-cp313-musllinux_1_2_ppc64le.whl", hash = "sha256:9b16c653d38eb1a611cc898c41e76859ca27f119d25b53c12875fd0474ae31a8"}, + {file = "aiohttp-3.13.5-cp313-cp313-musllinux_1_2_riscv64.whl", hash = "sha256:999802d5fa0389f58decd24b537c54aa63c01c3219ce17d1214cbda3c2b22d2d"}, + {file = "aiohttp-3.13.5-cp313-cp313-musllinux_1_2_s390x.whl", hash = "sha256:ec707059ee75732b1ba130ed5f9580fe10ff75180c812bc267ded039db5128c6"}, + {file = "aiohttp-3.13.5-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:2d6d44a5b48132053c2f6cd5c8cb14bc67e99a63594e336b0f2af81e94d5530c"}, + {file = "aiohttp-3.13.5-cp313-cp313-win32.whl", hash = "sha256:329f292ed14d38a6c4c435e465f48bebb47479fd676a0411936cc371643225cc"}, + {file = "aiohttp-3.13.5-cp313-cp313-win_amd64.whl", hash = "sha256:69f571de7500e0557801c0b51f4780482c0ec5fe2ac851af5a92cfce1af1cb83"}, + {file = "aiohttp-3.13.5-cp314-cp314-macosx_10_13_universal2.whl", hash = "sha256:eb4639f32fd4a9904ab8fb45bf3383ba71137f3d9d4ba25b3b3f3109977c5b8c"}, + {file = "aiohttp-3.13.5-cp314-cp314-macosx_10_13_x86_64.whl", hash = "sha256:7e5dc4311bd5ac493886c63cbf76ab579dbe4641268e7c74e48e774c74b6f2be"}, + {file = "aiohttp-3.13.5-cp314-cp314-macosx_11_0_arm64.whl", hash = "sha256:756c3c304d394977519824449600adaf2be0ccee76d206ee339c5e76b70ded25"}, + {file = "aiohttp-3.13.5-cp314-cp314-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:ecc26751323224cf8186efcf7fbcbc30f4e1d8c7970659daf25ad995e4032a56"}, + {file = "aiohttp-3.13.5-cp314-cp314-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:10a75acfcf794edf9d8db50e5a7ec5fc818b2a8d3f591ce93bc7b1210df016d2"}, + {file = "aiohttp-3.13.5-cp314-cp314-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:0f7a18f258d124cd678c5fe072fe4432a4d5232b0657fca7c1847f599233c83a"}, + {file = "aiohttp-3.13.5-cp314-cp314-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:df6104c009713d3a89621096f3e3e88cc323fd269dbd7c20afe18535094320be"}, + {file = "aiohttp-3.13.5-cp314-cp314-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:241a94f7de7c0c3b616627aaad530fe2cb620084a8b144d3be7b6ecfe95bae3b"}, + {file = "aiohttp-3.13.5-cp314-cp314-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:c974fb66180e58709b6fc402846f13791240d180b74de81d23913abe48e96d94"}, + {file = "aiohttp-3.13.5-cp314-cp314-musllinux_1_2_aarch64.whl", hash = "sha256:6e27ea05d184afac78aabbac667450c75e54e35f62238d44463131bd3f96753d"}, + {file = "aiohttp-3.13.5-cp314-cp314-musllinux_1_2_armv7l.whl", hash = "sha256:a79a6d399cef33a11b6f004c67bb07741d91f2be01b8d712d52c75711b1e07c7"}, + {file = "aiohttp-3.13.5-cp314-cp314-musllinux_1_2_ppc64le.whl", hash = "sha256:c632ce9c0b534fbe25b52c974515ed674937c5b99f549a92127c85f771a78772"}, + {file = "aiohttp-3.13.5-cp314-cp314-musllinux_1_2_riscv64.whl", hash = "sha256:fceedde51fbd67ee2bcc8c0b33d0126cc8b51ef3bbde2f86662bd6d5a6f10ec5"}, + {file = "aiohttp-3.13.5-cp314-cp314-musllinux_1_2_s390x.whl", hash = "sha256:f92995dfec9420bb69ae629abf422e516923ba79ba4403bc750d94fb4a6c68c1"}, + {file = "aiohttp-3.13.5-cp314-cp314-musllinux_1_2_x86_64.whl", hash = "sha256:20ae0ff08b1f2c8788d6fb85afcb798654ae6ba0b747575f8562de738078457b"}, + {file = "aiohttp-3.13.5-cp314-cp314-win32.whl", hash = "sha256:b20df693de16f42b2472a9c485e1c948ee55524786a0a34345511afdd22246f3"}, + {file = "aiohttp-3.13.5-cp314-cp314-win_amd64.whl", hash = "sha256:f85c6f327bf0b8c29da7d93b1cabb6363fb5e4e160a32fa241ed2dce21b73162"}, + {file = "aiohttp-3.13.5-cp314-cp314t-macosx_10_13_universal2.whl", hash = "sha256:1efb06900858bb618ff5cee184ae2de5828896c448403d51fb633f09e109be0a"}, + {file = "aiohttp-3.13.5-cp314-cp314t-macosx_10_13_x86_64.whl", hash = "sha256:fee86b7c4bd29bdaf0d53d14739b08a106fdda809ca5fe032a15f52fae5fe254"}, + {file = "aiohttp-3.13.5-cp314-cp314t-macosx_11_0_arm64.whl", hash = "sha256:20058e23909b9e65f9da62b396b77dfa95965cbe840f8def6e572538b1d32e36"}, + {file = "aiohttp-3.13.5-cp314-cp314t-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:8cf20a8d6868cb15a73cab329ffc07291ba8c22b1b88176026106ae39aa6df0f"}, + {file = "aiohttp-3.13.5-cp314-cp314t-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:330f5da04c987f1d5bdb8ae189137c77139f36bd1cb23779ca1a354a4b027800"}, + {file = "aiohttp-3.13.5-cp314-cp314t-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:6f1cbf0c7926d315c3c26c2da41fd2b5d2fe01ac0e157b78caefc51a782196cf"}, + {file = "aiohttp-3.13.5-cp314-cp314t-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:53fc049ed6390d05423ba33103ded7281fe897cf97878f369a527070bd95795b"}, + {file = "aiohttp-3.13.5-cp314-cp314t-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:898703aa2667e3c5ca4c54ca36cd73f58b7a38ef87a5606414799ebce4d3fd3a"}, + {file = "aiohttp-3.13.5-cp314-cp314t-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:0494a01ca9584eea1e5fbd6d748e61ecff218c51b576ee1999c23db7066417d8"}, + {file = "aiohttp-3.13.5-cp314-cp314t-musllinux_1_2_aarch64.whl", hash = "sha256:6cf81fe010b8c17b09495cbd15c1d35afbc8fb405c0c9cf4738e5ae3af1d65be"}, + {file = "aiohttp-3.13.5-cp314-cp314t-musllinux_1_2_armv7l.whl", hash = "sha256:c564dd5f09ddc9d8f2c2d0a301cd30a79a2cc1b46dd1a73bef8f0038863d016b"}, + {file = "aiohttp-3.13.5-cp314-cp314t-musllinux_1_2_ppc64le.whl", hash = "sha256:2994be9f6e51046c4f864598fd9abeb4fba6e88f0b2152422c9666dcd4aea9c6"}, + {file = "aiohttp-3.13.5-cp314-cp314t-musllinux_1_2_riscv64.whl", hash = "sha256:157826e2fa245d2ef46c83ea8a5faf77ca19355d278d425c29fda0beb3318037"}, + {file = "aiohttp-3.13.5-cp314-cp314t-musllinux_1_2_s390x.whl", hash = "sha256:a8aca50daa9493e9e13c0f566201a9006f080e7c50e5e90d0b06f53146a54500"}, + {file = "aiohttp-3.13.5-cp314-cp314t-musllinux_1_2_x86_64.whl", hash = "sha256:3b13560160d07e047a93f23aaa30718606493036253d5430887514715b67c9d9"}, + {file = "aiohttp-3.13.5-cp314-cp314t-win32.whl", hash = "sha256:9a0f4474b6ea6818b41f82172d799e4b3d29e22c2c520ce4357856fced9af2f8"}, + {file = "aiohttp-3.13.5-cp314-cp314t-win_amd64.whl", hash = "sha256:18a2f6c1182c51baa1d28d68fea51513cb2a76612f038853c0ad3c145423d3d9"}, + {file = "aiohttp-3.13.5-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:347542f0ea3f95b2a955ee6656461fa1c776e401ac50ebce055a6c38454a0adf"}, + {file = "aiohttp-3.13.5-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:178c7b5e62b454c2bc790786e6058c3cc968613b4419251b478c153a4aec32b1"}, + {file = "aiohttp-3.13.5-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:af545c2cffdb0967a96b6249e6f5f7b0d92cdfd267f9d5238d5b9ca63e8edb10"}, + {file = "aiohttp-3.13.5-cp39-cp39-manylinux2014_aarch64.manylinux_2_17_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:206b7b3ef96e4ce211754f0cd003feb28b7d81f0ad26b8d077a5d5161436067f"}, + {file = "aiohttp-3.13.5-cp39-cp39-manylinux2014_armv7l.manylinux_2_17_armv7l.manylinux_2_31_armv7l.whl", hash = "sha256:ee5e86776273de1795947d17bddd6bb19e0365fd2af4289c0d2c5454b6b1d36b"}, + {file = "aiohttp-3.13.5-cp39-cp39-manylinux2014_ppc64le.manylinux_2_17_ppc64le.manylinux_2_28_ppc64le.whl", hash = "sha256:95d14ca7abefde230f7639ec136ade282655431fd5db03c343b19dda72dd1643"}, + {file = "aiohttp-3.13.5-cp39-cp39-manylinux2014_s390x.manylinux_2_17_s390x.manylinux_2_28_s390x.whl", hash = "sha256:912d4b6af530ddb1338a66229dac3a25ff11d4448be3ec3d6340583995f56031"}, + {file = "aiohttp-3.13.5-cp39-cp39-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:e999f0c88a458c836d5fb521814e92ed2172c649200336a6df514987c1488258"}, + {file = "aiohttp-3.13.5-cp39-cp39-manylinux_2_31_riscv64.manylinux_2_39_riscv64.whl", hash = "sha256:39380e12bd1f2fdab4285b6e055ad48efbaed5c836433b142ed4f5b9be71036a"}, + {file = "aiohttp-3.13.5-cp39-cp39-musllinux_1_2_aarch64.whl", hash = "sha256:9efcc0f11d850cefcafdd9275b9576ad3bfb539bed96807663b32ad99c4d4b88"}, + {file = "aiohttp-3.13.5-cp39-cp39-musllinux_1_2_armv7l.whl", hash = "sha256:147b4f501d0292077f29d5268c16bb7c864a1f054d7001c4c1812c0421ea1ed0"}, + {file = "aiohttp-3.13.5-cp39-cp39-musllinux_1_2_ppc64le.whl", hash = "sha256:d147004fede1b12f6013a6dbb2a26a986a671a03c6ea740ddc76500e5f1c399f"}, + {file = "aiohttp-3.13.5-cp39-cp39-musllinux_1_2_riscv64.whl", hash = "sha256:9277145d36a01653863899c665243871434694bcc3431922c3b35c978061bdb8"}, + {file = "aiohttp-3.13.5-cp39-cp39-musllinux_1_2_s390x.whl", hash = "sha256:4e704c52438f66fdd89588346183d898bb42167cf88f8b7ff1c0f9fc957c348f"}, + {file = "aiohttp-3.13.5-cp39-cp39-musllinux_1_2_x86_64.whl", hash = "sha256:a8a4d3427e8de1312ddf309cc482186466c79895b3a139fed3259fc01dfa9a5b"}, + {file = "aiohttp-3.13.5-cp39-cp39-win32.whl", hash = "sha256:6f497a6876aa4b1a102b04996ce4c1170c7040d83faa9387dd921c16e30d5c83"}, + {file = "aiohttp-3.13.5-cp39-cp39-win_amd64.whl", hash = "sha256:cb979826071c0986a5f08333a36104153478ce6018c58cba7f9caddaf63d5d67"}, + {file = "aiohttp-3.13.5.tar.gz", hash = "sha256:9d98cc980ecc96be6eb4c1994ce35d28d8b1f5e5208a23b421187d1209dbb7d1"}, ] [package.dependencies] diff --git a/pyproject.toml b/pyproject.toml index 5893450c..e5ba81d3 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -1,6 +1,6 @@ [project] name = "vulncheck_sdk" -version = "0.0.44" +version = "0.0.45" description = "VulnCheck API" authors = [ {name = "VulnCheck API Support",email = "support@vulncheck.com"}, diff --git a/python-generator-config.yaml b/python-generator-config.yaml index 27705a1b..a82c1925 100644 --- a/python-generator-config.yaml +++ b/python-generator-config.yaml @@ -2,4 +2,4 @@ additionalProperties: projectName: "vulncheck-sdk" packageName: "vulncheck_sdk" packageUrl: "https://github.com/vulncheck-oss/sdk-python/tree/main" - packageVersion: "0.0.44" + packageVersion: "0.0.45" diff --git a/setup.py b/setup.py index 404c9e8d..8d38c29c 100644 --- a/setup.py +++ b/setup.py @@ -22,7 +22,7 @@ # prerequisite: setuptools # http://pypi.python.org/pypi/setuptools NAME = "vulncheck-sdk" -VERSION = "0.0.44" +VERSION = "0.0.45" PYTHON_REQUIRES = ">= 3.9" REQUIRES = [ "aiohttp_retry >= 2.8.3", diff --git a/test/aio/test_advisory_generic_eol.py b/test/aio/test_advisory_generic_eol.py new file mode 100644 index 00000000..509d020c --- /dev/null +++ b/test/aio/test_advisory_generic_eol.py @@ -0,0 +1,76 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.aio.models.advisory_generic_eol import AdvisoryGenericEOL + +class TestAdvisoryGenericEOL(unittest.TestCase): + """AdvisoryGenericEOL unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> AdvisoryGenericEOL: + """Test AdvisoryGenericEOL + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `AdvisoryGenericEOL` + """ + model = AdvisoryGenericEOL() + if include_optional: + return AdvisoryGenericEOL( + core = vulncheck_sdk.aio.models.advisory/generic_eol_core.advisory.GenericEOLCore( + end_of_life = '', + end_of_sales = '', + end_of_security_support = '', + last_updated = '', ), + product = vulncheck_sdk.aio.models.advisory/generic_eol_product.advisory.GenericEOLProduct( + product_name = '', + product_version = '', + vendor_name = '', ), + vc_info = vulncheck_sdk.aio.models.advisory/generic_eolvc_info.advisory.GenericEOLVCInfo( + cve = [ + '' + ], + date_added = '', + references = [ + vulncheck_sdk.aio.models.advisory/generic_eol_reference.advisory.GenericEOLReference( + description = '', + url = '', ) + ], + replacement = vulncheck_sdk.aio.models.advisory/generic_eol_product.advisory.GenericEOLProduct( + product_name = '', + product_version = '', + vendor_name = '', ), + updated_at = '', + version = '', ) + ) + else: + return AdvisoryGenericEOL( + ) + """ + + def testAdvisoryGenericEOL(self): + """Test AdvisoryGenericEOL""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/aio/test_advisory_generic_eol_core.py b/test/aio/test_advisory_generic_eol_core.py new file mode 100644 index 00000000..72e7bd7f --- /dev/null +++ b/test/aio/test_advisory_generic_eol_core.py @@ -0,0 +1,55 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.aio.models.advisory_generic_eol_core import AdvisoryGenericEOLCore + +class TestAdvisoryGenericEOLCore(unittest.TestCase): + """AdvisoryGenericEOLCore unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> AdvisoryGenericEOLCore: + """Test AdvisoryGenericEOLCore + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `AdvisoryGenericEOLCore` + """ + model = AdvisoryGenericEOLCore() + if include_optional: + return AdvisoryGenericEOLCore( + end_of_life = '', + end_of_sales = '', + end_of_security_support = '', + last_updated = '' + ) + else: + return AdvisoryGenericEOLCore( + ) + """ + + def testAdvisoryGenericEOLCore(self): + """Test AdvisoryGenericEOLCore""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/aio/test_advisory_generic_eol_product.py b/test/aio/test_advisory_generic_eol_product.py new file mode 100644 index 00000000..b598ec90 --- /dev/null +++ b/test/aio/test_advisory_generic_eol_product.py @@ -0,0 +1,54 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.aio.models.advisory_generic_eol_product import AdvisoryGenericEOLProduct + +class TestAdvisoryGenericEOLProduct(unittest.TestCase): + """AdvisoryGenericEOLProduct unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> AdvisoryGenericEOLProduct: + """Test AdvisoryGenericEOLProduct + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `AdvisoryGenericEOLProduct` + """ + model = AdvisoryGenericEOLProduct() + if include_optional: + return AdvisoryGenericEOLProduct( + product_name = '', + product_version = '', + vendor_name = '' + ) + else: + return AdvisoryGenericEOLProduct( + ) + """ + + def testAdvisoryGenericEOLProduct(self): + """Test AdvisoryGenericEOLProduct""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/aio/test_advisory_generic_eol_reference.py b/test/aio/test_advisory_generic_eol_reference.py new file mode 100644 index 00000000..55609a56 --- /dev/null +++ b/test/aio/test_advisory_generic_eol_reference.py @@ -0,0 +1,53 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.aio.models.advisory_generic_eol_reference import AdvisoryGenericEOLReference + +class TestAdvisoryGenericEOLReference(unittest.TestCase): + """AdvisoryGenericEOLReference unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> AdvisoryGenericEOLReference: + """Test AdvisoryGenericEOLReference + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `AdvisoryGenericEOLReference` + """ + model = AdvisoryGenericEOLReference() + if include_optional: + return AdvisoryGenericEOLReference( + description = '', + url = '' + ) + else: + return AdvisoryGenericEOLReference( + ) + """ + + def testAdvisoryGenericEOLReference(self): + """Test AdvisoryGenericEOLReference""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/aio/test_advisory_generic_eolvc_info.py b/test/aio/test_advisory_generic_eolvc_info.py new file mode 100644 index 00000000..d49066b9 --- /dev/null +++ b/test/aio/test_advisory_generic_eolvc_info.py @@ -0,0 +1,66 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.aio.models.advisory_generic_eolvc_info import AdvisoryGenericEOLVCInfo + +class TestAdvisoryGenericEOLVCInfo(unittest.TestCase): + """AdvisoryGenericEOLVCInfo unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> AdvisoryGenericEOLVCInfo: + """Test AdvisoryGenericEOLVCInfo + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `AdvisoryGenericEOLVCInfo` + """ + model = AdvisoryGenericEOLVCInfo() + if include_optional: + return AdvisoryGenericEOLVCInfo( + cve = [ + '' + ], + date_added = '', + references = [ + vulncheck_sdk.aio.models.advisory/generic_eol_reference.advisory.GenericEOLReference( + description = '', + url = '', ) + ], + replacement = vulncheck_sdk.aio.models.advisory/generic_eol_product.advisory.GenericEOLProduct( + product_name = '', + product_version = '', + vendor_name = '', ), + updated_at = '', + version = '' + ) + else: + return AdvisoryGenericEOLVCInfo( + ) + """ + + def testAdvisoryGenericEOLVCInfo(self): + """Test AdvisoryGenericEOLVCInfo""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/aio/test_advisory_j_frog.py b/test/aio/test_advisory_j_frog.py index 32de083d..f84c90dc 100644 --- a/test/aio/test_advisory_j_frog.py +++ b/test/aio/test_advisory_j_frog.py @@ -53,6 +53,7 @@ def make_instance(self, include_optional) -> AdvisoryJFrog: product = '', severity = '', summary = '', + updated_at = '', url = '', versions = [ '' diff --git a/test/aio/test_indices_api.py b/test/aio/test_indices_api.py index bde1663e..6a1800fa 100644 --- a/test/aio/test_indices_api.py +++ b/test/aio/test_indices_api.py @@ -2253,6 +2253,13 @@ async def test_index_okta_get(self) -> None: """ pass + async def test_index_omron_eol_get(self) -> None: + """Test case for index_omron_eol_get + + Return vulnerability data stored in index \"omron-eol\" + """ + pass + async def test_index_omron_get(self) -> None: """Test case for index_omron_get @@ -3394,6 +3401,13 @@ async def test_index_zdi_get(self) -> None: """ pass + async def test_index_zebra_eol_get(self) -> None: + """Test case for index_zebra_eol_get + + Return vulnerability data stored in index \"zebra-eol\" + """ + pass + async def test_index_zebra_get(self) -> None: """Test case for index_zebra_get diff --git a/test/aio/test_render_response_with_metadata_array_advisory_generic_eol_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_generic_eol_paginate_pagination.py new file mode 100644 index 00000000..80f1558a --- /dev/null +++ b/test/aio/test_render_response_with_metadata_array_advisory_generic_eol_paginate_pagination.py @@ -0,0 +1,114 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination + +class TestRenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination(unittest.TestCase): + """RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: + """Test RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination` + """ + model = RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination() + if include_optional: + return RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination( + benchmark = 1.337, + meta = vulncheck_sdk.aio.models.paginate/pagination.paginate.Pagination( + cursor = '', + first_item = 56, + index = '', + last_item = 56, + limit = 56, + matches = [ + vulncheck_sdk.aio.models.paginate/match.paginate.Match( + field = '', + value = '', ) + ], + max_pages = 56, + next_cursor = '', + opensearch_query = vulncheck_sdk.aio.models.opensearch_query.opensearch_query(), + order = '', + page = 56, + pages = [ + '' + ], + parameters = [ + vulncheck_sdk.aio.models.paginate/param.paginate.Param( + filtering = '', + format = '', + name = '', ) + ], + show_pages = True, + show_query = True, + sort = '', + timestamp = '', + total_documents = 56, + total_pages = 56, + warnings = [ + '' + ], ), + data = [ + vulncheck_sdk.aio.models.advisory/generic_eol.advisory.GenericEOL( + core = vulncheck_sdk.aio.models.advisory/generic_eol_core.advisory.GenericEOLCore( + end_of_life = '', + end_of_sales = '', + end_of_security_support = '', + last_updated = '', ), + product = vulncheck_sdk.aio.models.advisory/generic_eol_product.advisory.GenericEOLProduct( + product_name = '', + product_version = '', + vendor_name = '', ), + vc_info = vulncheck_sdk.aio.models.advisory/generic_eolvc_info.advisory.GenericEOLVCInfo( + cve = [ + '' + ], + date_added = '', + references = [ + vulncheck_sdk.aio.models.advisory/generic_eol_reference.advisory.GenericEOLReference( + description = '', + url = '', ) + ], + replacement = vulncheck_sdk.aio.models.advisory/generic_eol_product.advisory.GenericEOLProduct( + product_name = '', + product_version = '', + vendor_name = '', ), + updated_at = '', + version = '', ), ) + ] + ) + else: + return RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination( + ) + """ + + def testRenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination(self): + """Test RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/aio/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py index 72acfc7a..11e38b51 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py @@ -90,6 +90,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi product = '', severity = '', summary = '', + updated_at = '', url = '', versions = [ '' diff --git a/test/blocking/test_advisory_generic_eol.py b/test/blocking/test_advisory_generic_eol.py new file mode 100644 index 00000000..0f6e9557 --- /dev/null +++ b/test/blocking/test_advisory_generic_eol.py @@ -0,0 +1,76 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.advisory_generic_eol import AdvisoryGenericEOL + +class TestAdvisoryGenericEOL(unittest.TestCase): + """AdvisoryGenericEOL unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> AdvisoryGenericEOL: + """Test AdvisoryGenericEOL + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `AdvisoryGenericEOL` + """ + model = AdvisoryGenericEOL() + if include_optional: + return AdvisoryGenericEOL( + core = vulncheck_sdk.models.advisory/generic_eol_core.advisory.GenericEOLCore( + end_of_life = '', + end_of_sales = '', + end_of_security_support = '', + last_updated = '', ), + product = vulncheck_sdk.models.advisory/generic_eol_product.advisory.GenericEOLProduct( + product_name = '', + product_version = '', + vendor_name = '', ), + vc_info = vulncheck_sdk.models.advisory/generic_eolvc_info.advisory.GenericEOLVCInfo( + cve = [ + '' + ], + date_added = '', + references = [ + vulncheck_sdk.models.advisory/generic_eol_reference.advisory.GenericEOLReference( + description = '', + url = '', ) + ], + replacement = vulncheck_sdk.models.advisory/generic_eol_product.advisory.GenericEOLProduct( + product_name = '', + product_version = '', + vendor_name = '', ), + updated_at = '', + version = '', ) + ) + else: + return AdvisoryGenericEOL( + ) + """ + + def testAdvisoryGenericEOL(self): + """Test AdvisoryGenericEOL""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/blocking/test_advisory_generic_eol_core.py b/test/blocking/test_advisory_generic_eol_core.py new file mode 100644 index 00000000..249790cb --- /dev/null +++ b/test/blocking/test_advisory_generic_eol_core.py @@ -0,0 +1,55 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.advisory_generic_eol_core import AdvisoryGenericEOLCore + +class TestAdvisoryGenericEOLCore(unittest.TestCase): + """AdvisoryGenericEOLCore unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> AdvisoryGenericEOLCore: + """Test AdvisoryGenericEOLCore + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `AdvisoryGenericEOLCore` + """ + model = AdvisoryGenericEOLCore() + if include_optional: + return AdvisoryGenericEOLCore( + end_of_life = '', + end_of_sales = '', + end_of_security_support = '', + last_updated = '' + ) + else: + return AdvisoryGenericEOLCore( + ) + """ + + def testAdvisoryGenericEOLCore(self): + """Test AdvisoryGenericEOLCore""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/blocking/test_advisory_generic_eol_product.py b/test/blocking/test_advisory_generic_eol_product.py new file mode 100644 index 00000000..89b50e88 --- /dev/null +++ b/test/blocking/test_advisory_generic_eol_product.py @@ -0,0 +1,54 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.advisory_generic_eol_product import AdvisoryGenericEOLProduct + +class TestAdvisoryGenericEOLProduct(unittest.TestCase): + """AdvisoryGenericEOLProduct unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> AdvisoryGenericEOLProduct: + """Test AdvisoryGenericEOLProduct + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `AdvisoryGenericEOLProduct` + """ + model = AdvisoryGenericEOLProduct() + if include_optional: + return AdvisoryGenericEOLProduct( + product_name = '', + product_version = '', + vendor_name = '' + ) + else: + return AdvisoryGenericEOLProduct( + ) + """ + + def testAdvisoryGenericEOLProduct(self): + """Test AdvisoryGenericEOLProduct""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/blocking/test_advisory_generic_eol_reference.py b/test/blocking/test_advisory_generic_eol_reference.py new file mode 100644 index 00000000..adb21062 --- /dev/null +++ b/test/blocking/test_advisory_generic_eol_reference.py @@ -0,0 +1,53 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.advisory_generic_eol_reference import AdvisoryGenericEOLReference + +class TestAdvisoryGenericEOLReference(unittest.TestCase): + """AdvisoryGenericEOLReference unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> AdvisoryGenericEOLReference: + """Test AdvisoryGenericEOLReference + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `AdvisoryGenericEOLReference` + """ + model = AdvisoryGenericEOLReference() + if include_optional: + return AdvisoryGenericEOLReference( + description = '', + url = '' + ) + else: + return AdvisoryGenericEOLReference( + ) + """ + + def testAdvisoryGenericEOLReference(self): + """Test AdvisoryGenericEOLReference""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/blocking/test_advisory_generic_eolvc_info.py b/test/blocking/test_advisory_generic_eolvc_info.py new file mode 100644 index 00000000..b9c67feb --- /dev/null +++ b/test/blocking/test_advisory_generic_eolvc_info.py @@ -0,0 +1,66 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.advisory_generic_eolvc_info import AdvisoryGenericEOLVCInfo + +class TestAdvisoryGenericEOLVCInfo(unittest.TestCase): + """AdvisoryGenericEOLVCInfo unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> AdvisoryGenericEOLVCInfo: + """Test AdvisoryGenericEOLVCInfo + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `AdvisoryGenericEOLVCInfo` + """ + model = AdvisoryGenericEOLVCInfo() + if include_optional: + return AdvisoryGenericEOLVCInfo( + cve = [ + '' + ], + date_added = '', + references = [ + vulncheck_sdk.models.advisory/generic_eol_reference.advisory.GenericEOLReference( + description = '', + url = '', ) + ], + replacement = vulncheck_sdk.models.advisory/generic_eol_product.advisory.GenericEOLProduct( + product_name = '', + product_version = '', + vendor_name = '', ), + updated_at = '', + version = '' + ) + else: + return AdvisoryGenericEOLVCInfo( + ) + """ + + def testAdvisoryGenericEOLVCInfo(self): + """Test AdvisoryGenericEOLVCInfo""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/blocking/test_advisory_j_frog.py b/test/blocking/test_advisory_j_frog.py index 61b99949..326040bc 100644 --- a/test/blocking/test_advisory_j_frog.py +++ b/test/blocking/test_advisory_j_frog.py @@ -53,6 +53,7 @@ def make_instance(self, include_optional) -> AdvisoryJFrog: product = '', severity = '', summary = '', + updated_at = '', url = '', versions = [ '' diff --git a/test/blocking/test_indices_api.py b/test/blocking/test_indices_api.py index 3aa5796d..73e803c6 100644 --- a/test/blocking/test_indices_api.py +++ b/test/blocking/test_indices_api.py @@ -2253,6 +2253,13 @@ def test_index_okta_get(self) -> None: """ pass + def test_index_omron_eol_get(self) -> None: + """Test case for index_omron_eol_get + + Return vulnerability data stored in index \"omron-eol\" + """ + pass + def test_index_omron_get(self) -> None: """Test case for index_omron_get @@ -3394,6 +3401,13 @@ def test_index_zdi_get(self) -> None: """ pass + def test_index_zebra_eol_get(self) -> None: + """Test case for index_zebra_eol_get + + Return vulnerability data stored in index \"zebra-eol\" + """ + pass + def test_index_zebra_get(self) -> None: """Test case for index_zebra_get diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_generic_eol_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_generic_eol_paginate_pagination.py new file mode 100644 index 00000000..8824cae2 --- /dev/null +++ b/test/blocking/test_render_response_with_metadata_array_advisory_generic_eol_paginate_pagination.py @@ -0,0 +1,114 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination + +class TestRenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination(unittest.TestCase): + """RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: + """Test RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination` + """ + model = RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination() + if include_optional: + return RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination( + benchmark = 1.337, + meta = vulncheck_sdk.models.paginate/pagination.paginate.Pagination( + cursor = '', + first_item = 56, + index = '', + last_item = 56, + limit = 56, + matches = [ + vulncheck_sdk.models.paginate/match.paginate.Match( + field = '', + value = '', ) + ], + max_pages = 56, + next_cursor = '', + opensearch_query = vulncheck_sdk.models.opensearch_query.opensearch_query(), + order = '', + page = 56, + pages = [ + '' + ], + parameters = [ + vulncheck_sdk.models.paginate/param.paginate.Param( + filtering = '', + format = '', + name = '', ) + ], + show_pages = True, + show_query = True, + sort = '', + timestamp = '', + total_documents = 56, + total_pages = 56, + warnings = [ + '' + ], ), + data = [ + vulncheck_sdk.models.advisory/generic_eol.advisory.GenericEOL( + core = vulncheck_sdk.models.advisory/generic_eol_core.advisory.GenericEOLCore( + end_of_life = '', + end_of_sales = '', + end_of_security_support = '', + last_updated = '', ), + product = vulncheck_sdk.models.advisory/generic_eol_product.advisory.GenericEOLProduct( + product_name = '', + product_version = '', + vendor_name = '', ), + vc_info = vulncheck_sdk.models.advisory/generic_eolvc_info.advisory.GenericEOLVCInfo( + cve = [ + '' + ], + date_added = '', + references = [ + vulncheck_sdk.models.advisory/generic_eol_reference.advisory.GenericEOLReference( + description = '', + url = '', ) + ], + replacement = vulncheck_sdk.models.advisory/generic_eol_product.advisory.GenericEOLProduct( + product_name = '', + product_version = '', + vendor_name = '', ), + updated_at = '', + version = '', ), ) + ] + ) + else: + return RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination( + ) + """ + + def testRenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination(self): + """Test RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py index af8c1192..00603932 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py @@ -90,6 +90,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi product = '', severity = '', summary = '', + updated_at = '', url = '', versions = [ '' diff --git a/vulncheck_sdk/__init__.py b/vulncheck_sdk/__init__.py index 7d0224bf..6fa10d3d 100644 --- a/vulncheck_sdk/__init__.py +++ b/vulncheck_sdk/__init__.py @@ -15,7 +15,7 @@ """ # noqa: E501 -__version__ = "0.0.44" +__version__ = "0.0.45" # Define package exports __all__ = [ @@ -313,6 +313,11 @@ "AdvisoryGMOCyberSecurity", "AdvisoryGallagher", "AdvisoryGen", + "AdvisoryGenericEOL", + "AdvisoryGenericEOLCore", + "AdvisoryGenericEOLProduct", + "AdvisoryGenericEOLReference", + "AdvisoryGenericEOLVCInfo", "AdvisoryGenetec", "AdvisoryGigabyte", "AdvisoryGitHubExploit", @@ -1050,6 +1055,7 @@ "RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination", + "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination", "RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination", @@ -1655,6 +1661,11 @@ from vulncheck_sdk.models.advisory_gmo_cyber_security import AdvisoryGMOCyberSecurity as AdvisoryGMOCyberSecurity from vulncheck_sdk.models.advisory_gallagher import AdvisoryGallagher as AdvisoryGallagher from vulncheck_sdk.models.advisory_gen import AdvisoryGen as AdvisoryGen +from vulncheck_sdk.models.advisory_generic_eol import AdvisoryGenericEOL as AdvisoryGenericEOL +from vulncheck_sdk.models.advisory_generic_eol_core import AdvisoryGenericEOLCore as AdvisoryGenericEOLCore +from vulncheck_sdk.models.advisory_generic_eol_product import AdvisoryGenericEOLProduct as AdvisoryGenericEOLProduct +from vulncheck_sdk.models.advisory_generic_eol_reference import AdvisoryGenericEOLReference as AdvisoryGenericEOLReference +from vulncheck_sdk.models.advisory_generic_eolvc_info import AdvisoryGenericEOLVCInfo as AdvisoryGenericEOLVCInfo from vulncheck_sdk.models.advisory_genetec import AdvisoryGenetec as AdvisoryGenetec from vulncheck_sdk.models.advisory_gigabyte import AdvisoryGigabyte as AdvisoryGigabyte from vulncheck_sdk.models.advisory_git_hub_exploit import AdvisoryGitHubExploit as AdvisoryGitHubExploit @@ -2392,6 +2403,7 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination as RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gallagher_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination as RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gen_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination as RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination as RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_genetec_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination as RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gigabyte_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination as RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination as RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination diff --git a/vulncheck_sdk/aio/__init__.py b/vulncheck_sdk/aio/__init__.py index 76cf1fd9..16d194be 100644 --- a/vulncheck_sdk/aio/__init__.py +++ b/vulncheck_sdk/aio/__init__.py @@ -15,7 +15,7 @@ """ # noqa: E501 -__version__ = "0.0.44" +__version__ = "0.0.45" # Define package exports __all__ = [ @@ -313,6 +313,11 @@ "AdvisoryGMOCyberSecurity", "AdvisoryGallagher", "AdvisoryGen", + "AdvisoryGenericEOL", + "AdvisoryGenericEOLCore", + "AdvisoryGenericEOLProduct", + "AdvisoryGenericEOLReference", + "AdvisoryGenericEOLVCInfo", "AdvisoryGenetec", "AdvisoryGigabyte", "AdvisoryGitHubExploit", @@ -1050,6 +1055,7 @@ "RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination", + "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination", "RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination", "RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination", @@ -1655,6 +1661,11 @@ from vulncheck_sdk.aio.models.advisory_gmo_cyber_security import AdvisoryGMOCyberSecurity as AdvisoryGMOCyberSecurity from vulncheck_sdk.aio.models.advisory_gallagher import AdvisoryGallagher as AdvisoryGallagher from vulncheck_sdk.aio.models.advisory_gen import AdvisoryGen as AdvisoryGen +from vulncheck_sdk.aio.models.advisory_generic_eol import AdvisoryGenericEOL as AdvisoryGenericEOL +from vulncheck_sdk.aio.models.advisory_generic_eol_core import AdvisoryGenericEOLCore as AdvisoryGenericEOLCore +from vulncheck_sdk.aio.models.advisory_generic_eol_product import AdvisoryGenericEOLProduct as AdvisoryGenericEOLProduct +from vulncheck_sdk.aio.models.advisory_generic_eol_reference import AdvisoryGenericEOLReference as AdvisoryGenericEOLReference +from vulncheck_sdk.aio.models.advisory_generic_eolvc_info import AdvisoryGenericEOLVCInfo as AdvisoryGenericEOLVCInfo from vulncheck_sdk.aio.models.advisory_genetec import AdvisoryGenetec as AdvisoryGenetec from vulncheck_sdk.aio.models.advisory_gigabyte import AdvisoryGigabyte as AdvisoryGigabyte from vulncheck_sdk.aio.models.advisory_git_hub_exploit import AdvisoryGitHubExploit as AdvisoryGitHubExploit @@ -2392,6 +2403,7 @@ from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination as RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_gallagher_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination as RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_gen_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination as RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination +from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination as RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_genetec_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination as RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_gigabyte_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination as RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination as RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination diff --git a/vulncheck_sdk/aio/api/indices_api.py b/vulncheck_sdk/aio/api/indices_api.py index 2fd7da6a..415ae755 100644 --- a/vulncheck_sdk/aio/api/indices_api.py +++ b/vulncheck_sdk/aio/api/indices_api.py @@ -191,6 +191,7 @@ from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_gallagher_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_gen_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination +from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_genetec_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_gigabyte_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination @@ -211675,7 +211676,7 @@ def _index_okta_get_serialize( @validate_call - async def index_omron_get( + async def index_omron_eol_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211713,10 +211714,10 @@ async def index_omron_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination: - """Return vulnerability data stored in index \"omron\" + ) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: + """Return vulnerability data stored in index \"omron-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` :param page: set the page number of the response :type page: int @@ -211788,7 +211789,7 @@ async def index_omron_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_omron_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211820,7 +211821,7 @@ async def index_omron_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -211836,7 +211837,7 @@ async def index_omron_get( @validate_call - async def index_omron_get_with_http_info( + async def index_omron_eol_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211874,10 +211875,10 @@ async def index_omron_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination]: - """Return vulnerability data stored in index \"omron\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination]: + """Return vulnerability data stored in index \"omron-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` :param page: set the page number of the response :type page: int @@ -211949,7 +211950,7 @@ async def index_omron_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_omron_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211981,7 +211982,7 @@ async def index_omron_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -211997,7 +211998,7 @@ async def index_omron_get_with_http_info( @validate_call - async def index_omron_get_without_preload_content( + async def index_omron_eol_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212036,9 +212037,9 @@ async def index_omron_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"omron\" + """Return vulnerability data stored in index \"omron-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` :param page: set the page number of the response :type page: int @@ -212110,7 +212111,7 @@ async def index_omron_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_omron_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212142,7 +212143,7 @@ async def index_omron_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -212153,7 +212154,7 @@ async def index_omron_get_without_preload_content( return response_data.response - def _index_omron_get_serialize( + def _index_omron_eol_get_serialize( self, page, limit, @@ -212321,7 +212322,7 @@ def _index_omron_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/omron', + resource_path='/v3/index/omron-eol', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -212338,7 +212339,7 @@ def _index_omron_get_serialize( @validate_call - async def index_one_e_get( + async def index_omron_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212376,10 +212377,10 @@ async def index_one_e_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination: - """Return vulnerability data stored in index \"one-e\" + ) -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination: + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -212451,7 +212452,7 @@ async def index_one_e_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212483,7 +212484,7 @@ async def index_one_e_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -212499,7 +212500,7 @@ async def index_one_e_get( @validate_call - async def index_one_e_get_with_http_info( + async def index_omron_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212537,10 +212538,10 @@ async def index_one_e_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination]: - """Return vulnerability data stored in index \"one-e\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination]: + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -212612,7 +212613,7 @@ async def index_one_e_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212644,7 +212645,7 @@ async def index_one_e_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -212660,7 +212661,7 @@ async def index_one_e_get_with_http_info( @validate_call - async def index_one_e_get_without_preload_content( + async def index_omron_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212699,9 +212700,9 @@ async def index_one_e_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"one-e\" + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -212773,7 +212774,7 @@ async def index_one_e_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212805,7 +212806,7 @@ async def index_one_e_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -212816,7 +212817,7 @@ async def index_one_e_get_without_preload_content( return response_data.response - def _index_one_e_get_serialize( + def _index_omron_get_serialize( self, page, limit, @@ -212984,7 +212985,7 @@ def _index_one_e_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/one-e', + resource_path='/v3/index/omron', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -213001,7 +213002,7 @@ def _index_one_e_get_serialize( @validate_call - async def index_opam_get( + async def index_one_e_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213039,10 +213040,10 @@ async def index_opam_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"opam\" + ) -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination: + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -213114,7 +213115,7 @@ async def index_opam_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213146,7 +213147,7 @@ async def index_opam_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -213162,7 +213163,7 @@ async def index_opam_get( @validate_call - async def index_opam_get_with_http_info( + async def index_one_e_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213200,10 +213201,10 @@ async def index_opam_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"opam\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination]: + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -213275,7 +213276,7 @@ async def index_opam_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213307,7 +213308,7 @@ async def index_opam_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -213323,7 +213324,7 @@ async def index_opam_get_with_http_info( @validate_call - async def index_opam_get_without_preload_content( + async def index_one_e_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213362,9 +213363,9 @@ async def index_opam_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"opam\" + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -213436,7 +213437,7 @@ async def index_opam_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213468,7 +213469,7 @@ async def index_opam_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -213479,7 +213480,7 @@ async def index_opam_get_without_preload_content( return response_data.response - def _index_opam_get_serialize( + def _index_one_e_get_serialize( self, page, limit, @@ -213647,7 +213648,7 @@ def _index_opam_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/opam', + resource_path='/v3/index/one-e', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -213664,7 +213665,7 @@ def _index_opam_get_serialize( @validate_call - async def index_open_cvdb_get( + async def index_opam_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213702,10 +213703,10 @@ async def index_open_cvdb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination: - """Return vulnerability data stored in index \"open-cvdb\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -213777,7 +213778,7 @@ async def index_open_cvdb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213809,7 +213810,7 @@ async def index_open_cvdb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -213825,7 +213826,7 @@ async def index_open_cvdb_get( @validate_call - async def index_open_cvdb_get_with_http_info( + async def index_opam_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213863,10 +213864,10 @@ async def index_open_cvdb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination]: - """Return vulnerability data stored in index \"open-cvdb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -213938,7 +213939,7 @@ async def index_open_cvdb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213970,7 +213971,7 @@ async def index_open_cvdb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -213986,7 +213987,7 @@ async def index_open_cvdb_get_with_http_info( @validate_call - async def index_open_cvdb_get_without_preload_content( + async def index_opam_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214025,9 +214026,9 @@ async def index_open_cvdb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"open-cvdb\" + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -214099,7 +214100,7 @@ async def index_open_cvdb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214131,7 +214132,7 @@ async def index_open_cvdb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -214142,7 +214143,7 @@ async def index_open_cvdb_get_without_preload_content( return response_data.response - def _index_open_cvdb_get_serialize( + def _index_opam_get_serialize( self, page, limit, @@ -214310,7 +214311,7 @@ def _index_open_cvdb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/open-cvdb', + resource_path='/v3/index/opam', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -214327,7 +214328,7 @@ def _index_open_cvdb_get_serialize( @validate_call - async def index_openbsd_get( + async def index_open_cvdb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214365,10 +214366,10 @@ async def index_openbsd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination: - """Return vulnerability data stored in index \"openbsd\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination: + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -214440,7 +214441,7 @@ async def index_openbsd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214472,7 +214473,7 @@ async def index_openbsd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -214488,7 +214489,7 @@ async def index_openbsd_get( @validate_call - async def index_openbsd_get_with_http_info( + async def index_open_cvdb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214526,10 +214527,10 @@ async def index_openbsd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination]: - """Return vulnerability data stored in index \"openbsd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination]: + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -214601,7 +214602,7 @@ async def index_openbsd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214633,7 +214634,7 @@ async def index_openbsd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -214649,7 +214650,7 @@ async def index_openbsd_get_with_http_info( @validate_call - async def index_openbsd_get_without_preload_content( + async def index_open_cvdb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214688,9 +214689,9 @@ async def index_openbsd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openbsd\" + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -214762,7 +214763,7 @@ async def index_openbsd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214794,7 +214795,7 @@ async def index_openbsd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -214805,7 +214806,7 @@ async def index_openbsd_get_without_preload_content( return response_data.response - def _index_openbsd_get_serialize( + def _index_open_cvdb_get_serialize( self, page, limit, @@ -214973,7 +214974,7 @@ def _index_openbsd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openbsd', + resource_path='/v3/index/open-cvdb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -214990,7 +214991,7 @@ def _index_openbsd_get_serialize( @validate_call - async def index_opengear_get( + async def index_openbsd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215028,10 +215029,10 @@ async def index_opengear_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination: - """Return vulnerability data stored in index \"opengear\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination: + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -215103,7 +215104,7 @@ async def index_opengear_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215135,7 +215136,7 @@ async def index_opengear_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -215151,7 +215152,7 @@ async def index_opengear_get( @validate_call - async def index_opengear_get_with_http_info( + async def index_openbsd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215189,10 +215190,10 @@ async def index_opengear_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination]: - """Return vulnerability data stored in index \"opengear\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination]: + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -215264,7 +215265,7 @@ async def index_opengear_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215296,7 +215297,7 @@ async def index_opengear_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -215312,7 +215313,7 @@ async def index_opengear_get_with_http_info( @validate_call - async def index_opengear_get_without_preload_content( + async def index_openbsd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215351,9 +215352,9 @@ async def index_opengear_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"opengear\" + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -215425,7 +215426,7 @@ async def index_opengear_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215457,7 +215458,7 @@ async def index_opengear_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -215468,7 +215469,7 @@ async def index_opengear_get_without_preload_content( return response_data.response - def _index_opengear_get_serialize( + def _index_openbsd_get_serialize( self, page, limit, @@ -215636,7 +215637,7 @@ def _index_opengear_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/opengear', + resource_path='/v3/index/openbsd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -215653,7 +215654,7 @@ def _index_opengear_get_serialize( @validate_call - async def index_openjdk_get( + async def index_opengear_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215691,10 +215692,10 @@ async def index_openjdk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination: - """Return vulnerability data stored in index \"openjdk\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination: + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -215766,7 +215767,7 @@ async def index_openjdk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215798,7 +215799,7 @@ async def index_openjdk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -215814,7 +215815,7 @@ async def index_openjdk_get( @validate_call - async def index_openjdk_get_with_http_info( + async def index_opengear_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215852,10 +215853,10 @@ async def index_openjdk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination]: - """Return vulnerability data stored in index \"openjdk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination]: + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -215927,7 +215928,7 @@ async def index_openjdk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215959,7 +215960,7 @@ async def index_openjdk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -215975,7 +215976,7 @@ async def index_openjdk_get_with_http_info( @validate_call - async def index_openjdk_get_without_preload_content( + async def index_opengear_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216014,9 +216015,9 @@ async def index_openjdk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openjdk\" + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -216088,7 +216089,7 @@ async def index_openjdk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216120,7 +216121,7 @@ async def index_openjdk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -216131,7 +216132,7 @@ async def index_openjdk_get_without_preload_content( return response_data.response - def _index_openjdk_get_serialize( + def _index_opengear_get_serialize( self, page, limit, @@ -216299,7 +216300,7 @@ def _index_openjdk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openjdk', + resource_path='/v3/index/opengear', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -216316,7 +216317,7 @@ def _index_openjdk_get_serialize( @validate_call - async def index_openssh_get( + async def index_openjdk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216354,10 +216355,10 @@ async def index_openssh_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination: - """Return vulnerability data stored in index \"openssh\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination: + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -216429,7 +216430,7 @@ async def index_openssh_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216461,7 +216462,7 @@ async def index_openssh_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -216477,7 +216478,7 @@ async def index_openssh_get( @validate_call - async def index_openssh_get_with_http_info( + async def index_openjdk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216515,10 +216516,10 @@ async def index_openssh_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination]: - """Return vulnerability data stored in index \"openssh\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination]: + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -216590,7 +216591,7 @@ async def index_openssh_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216622,7 +216623,7 @@ async def index_openssh_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -216638,7 +216639,7 @@ async def index_openssh_get_with_http_info( @validate_call - async def index_openssh_get_without_preload_content( + async def index_openjdk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216677,9 +216678,9 @@ async def index_openssh_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openssh\" + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -216751,7 +216752,7 @@ async def index_openssh_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216783,7 +216784,7 @@ async def index_openssh_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -216794,7 +216795,7 @@ async def index_openssh_get_without_preload_content( return response_data.response - def _index_openssh_get_serialize( + def _index_openjdk_get_serialize( self, page, limit, @@ -216962,7 +216963,7 @@ def _index_openssh_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openssh', + resource_path='/v3/index/openjdk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -216979,7 +216980,7 @@ def _index_openssh_get_serialize( @validate_call - async def index_openssl_secadv_get( + async def index_openssh_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217017,10 +217018,10 @@ async def index_openssl_secadv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination: - """Return vulnerability data stored in index \"openssl-secadv\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination: + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -217092,7 +217093,7 @@ async def index_openssl_secadv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217124,7 +217125,7 @@ async def index_openssl_secadv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -217140,7 +217141,7 @@ async def index_openssl_secadv_get( @validate_call - async def index_openssl_secadv_get_with_http_info( + async def index_openssh_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217178,10 +217179,10 @@ async def index_openssl_secadv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination]: - """Return vulnerability data stored in index \"openssl-secadv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination]: + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -217253,7 +217254,7 @@ async def index_openssl_secadv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217285,7 +217286,7 @@ async def index_openssl_secadv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -217301,7 +217302,7 @@ async def index_openssl_secadv_get_with_http_info( @validate_call - async def index_openssl_secadv_get_without_preload_content( + async def index_openssh_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217340,9 +217341,9 @@ async def index_openssl_secadv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openssl-secadv\" + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -217414,7 +217415,7 @@ async def index_openssl_secadv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217446,7 +217447,7 @@ async def index_openssl_secadv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -217457,7 +217458,7 @@ async def index_openssl_secadv_get_without_preload_content( return response_data.response - def _index_openssl_secadv_get_serialize( + def _index_openssh_get_serialize( self, page, limit, @@ -217625,7 +217626,7 @@ def _index_openssl_secadv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openssl-secadv', + resource_path='/v3/index/openssh', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -217642,7 +217643,7 @@ def _index_openssl_secadv_get_serialize( @validate_call - async def index_openstack_get( + async def index_openssl_secadv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217680,10 +217681,10 @@ async def index_openstack_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination: - """Return vulnerability data stored in index \"openstack\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination: + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -217755,7 +217756,7 @@ async def index_openstack_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217787,7 +217788,7 @@ async def index_openstack_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -217803,7 +217804,7 @@ async def index_openstack_get( @validate_call - async def index_openstack_get_with_http_info( + async def index_openssl_secadv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217841,10 +217842,10 @@ async def index_openstack_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination]: - """Return vulnerability data stored in index \"openstack\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination]: + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -217916,7 +217917,7 @@ async def index_openstack_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217948,7 +217949,7 @@ async def index_openstack_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -217964,7 +217965,7 @@ async def index_openstack_get_with_http_info( @validate_call - async def index_openstack_get_without_preload_content( + async def index_openssl_secadv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218003,9 +218004,9 @@ async def index_openstack_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openstack\" + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -218077,7 +218078,7 @@ async def index_openstack_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218109,7 +218110,7 @@ async def index_openstack_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -218120,7 +218121,7 @@ async def index_openstack_get_without_preload_content( return response_data.response - def _index_openstack_get_serialize( + def _index_openssl_secadv_get_serialize( self, page, limit, @@ -218288,7 +218289,7 @@ def _index_openstack_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openstack', + resource_path='/v3/index/openssl-secadv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -218305,7 +218306,7 @@ def _index_openstack_get_serialize( @validate_call - async def index_openwrt_get( + async def index_openstack_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218343,10 +218344,10 @@ async def index_openwrt_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination: - """Return vulnerability data stored in index \"openwrt\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination: + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -218418,7 +218419,7 @@ async def index_openwrt_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218450,7 +218451,7 @@ async def index_openwrt_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -218466,7 +218467,7 @@ async def index_openwrt_get( @validate_call - async def index_openwrt_get_with_http_info( + async def index_openstack_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218504,10 +218505,10 @@ async def index_openwrt_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination]: - """Return vulnerability data stored in index \"openwrt\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination]: + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -218579,7 +218580,7 @@ async def index_openwrt_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218611,7 +218612,7 @@ async def index_openwrt_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -218627,7 +218628,7 @@ async def index_openwrt_get_with_http_info( @validate_call - async def index_openwrt_get_without_preload_content( + async def index_openstack_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218666,9 +218667,9 @@ async def index_openwrt_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openwrt\" + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -218740,7 +218741,7 @@ async def index_openwrt_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218772,7 +218773,7 @@ async def index_openwrt_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -218783,7 +218784,7 @@ async def index_openwrt_get_without_preload_content( return response_data.response - def _index_openwrt_get_serialize( + def _index_openstack_get_serialize( self, page, limit, @@ -218951,7 +218952,7 @@ def _index_openwrt_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openwrt', + resource_path='/v3/index/openstack', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -218968,7 +218969,7 @@ def _index_openwrt_get_serialize( @validate_call - async def index_oracle_cpu_csaf_get( + async def index_openwrt_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219006,10 +219007,10 @@ async def index_oracle_cpu_csaf_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + ) -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination: + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -219081,7 +219082,7 @@ async def index_oracle_cpu_csaf_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219113,7 +219114,7 @@ async def index_oracle_cpu_csaf_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -219129,7 +219130,7 @@ async def index_oracle_cpu_csaf_get( @validate_call - async def index_oracle_cpu_csaf_get_with_http_info( + async def index_openwrt_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219167,10 +219168,10 @@ async def index_oracle_cpu_csaf_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination]: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination]: + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -219242,7 +219243,7 @@ async def index_oracle_cpu_csaf_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219274,7 +219275,7 @@ async def index_oracle_cpu_csaf_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -219290,7 +219291,7 @@ async def index_oracle_cpu_csaf_get_with_http_info( @validate_call - async def index_oracle_cpu_csaf_get_without_preload_content( + async def index_openwrt_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219329,9 +219330,9 @@ async def index_oracle_cpu_csaf_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -219403,7 +219404,7 @@ async def index_oracle_cpu_csaf_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219435,7 +219436,7 @@ async def index_oracle_cpu_csaf_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -219446,7 +219447,7 @@ async def index_oracle_cpu_csaf_get_without_preload_content( return response_data.response - def _index_oracle_cpu_csaf_get_serialize( + def _index_openwrt_get_serialize( self, page, limit, @@ -219614,7 +219615,7 @@ def _index_oracle_cpu_csaf_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/oracle-cpu-csaf', + resource_path='/v3/index/openwrt', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -219631,7 +219632,7 @@ def _index_oracle_cpu_csaf_get_serialize( @validate_call - async def index_oracle_cpu_get( + async def index_oracle_cpu_csaf_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219669,10 +219670,10 @@ async def index_oracle_cpu_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination: - """Return vulnerability data stored in index \"oracle-cpu\" + ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination: + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -219744,7 +219745,7 @@ async def index_oracle_cpu_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219776,7 +219777,7 @@ async def index_oracle_cpu_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -219792,7 +219793,7 @@ async def index_oracle_cpu_get( @validate_call - async def index_oracle_cpu_get_with_http_info( + async def index_oracle_cpu_csaf_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219830,10 +219831,10 @@ async def index_oracle_cpu_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination]: - """Return vulnerability data stored in index \"oracle-cpu\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination]: + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -219905,7 +219906,7 @@ async def index_oracle_cpu_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219937,7 +219938,7 @@ async def index_oracle_cpu_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -219953,7 +219954,7 @@ async def index_oracle_cpu_get_with_http_info( @validate_call - async def index_oracle_cpu_get_without_preload_content( + async def index_oracle_cpu_csaf_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219992,9 +219993,9 @@ async def index_oracle_cpu_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle-cpu\" + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -220066,7 +220067,7 @@ async def index_oracle_cpu_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220098,7 +220099,7 @@ async def index_oracle_cpu_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -220109,7 +220110,7 @@ async def index_oracle_cpu_get_without_preload_content( return response_data.response - def _index_oracle_cpu_get_serialize( + def _index_oracle_cpu_csaf_get_serialize( self, page, limit, @@ -220277,7 +220278,7 @@ def _index_oracle_cpu_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/oracle-cpu', + resource_path='/v3/index/oracle-cpu-csaf', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -220294,7 +220295,7 @@ def _index_oracle_cpu_get_serialize( @validate_call - async def index_oracle_get( + async def index_oracle_cpu_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220332,10 +220333,10 @@ async def index_oracle_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination: - """Return vulnerability data stored in index \"oracle\" + ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination: + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -220407,7 +220408,7 @@ async def index_oracle_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220439,7 +220440,7 @@ async def index_oracle_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -220455,7 +220456,7 @@ async def index_oracle_get( @validate_call - async def index_oracle_get_with_http_info( + async def index_oracle_cpu_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220493,10 +220494,10 @@ async def index_oracle_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination]: - """Return vulnerability data stored in index \"oracle\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination]: + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -220568,7 +220569,7 @@ async def index_oracle_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220600,7 +220601,7 @@ async def index_oracle_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -220616,7 +220617,7 @@ async def index_oracle_get_with_http_info( @validate_call - async def index_oracle_get_without_preload_content( + async def index_oracle_cpu_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220655,9 +220656,9 @@ async def index_oracle_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle\" + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -220729,7 +220730,7 @@ async def index_oracle_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220761,7 +220762,7 @@ async def index_oracle_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -220772,7 +220773,7 @@ async def index_oracle_get_without_preload_content( return response_data.response - def _index_oracle_get_serialize( + def _index_oracle_cpu_get_serialize( self, page, limit, @@ -220940,7 +220941,7 @@ def _index_oracle_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/oracle', + resource_path='/v3/index/oracle-cpu', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -220957,7 +220958,7 @@ def _index_oracle_get_serialize( @validate_call - async def index_osv_get( + async def index_oracle_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220995,10 +220996,10 @@ async def index_osv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination: - """Return vulnerability data stored in index \"osv\" + ) -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination: + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -221070,7 +221071,7 @@ async def index_osv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221102,7 +221103,7 @@ async def index_osv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -221118,7 +221119,7 @@ async def index_osv_get( @validate_call - async def index_osv_get_with_http_info( + async def index_oracle_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221156,10 +221157,10 @@ async def index_osv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination]: - """Return vulnerability data stored in index \"osv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination]: + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -221231,7 +221232,7 @@ async def index_osv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221263,7 +221264,7 @@ async def index_osv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -221279,7 +221280,7 @@ async def index_osv_get_with_http_info( @validate_call - async def index_osv_get_without_preload_content( + async def index_oracle_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221318,9 +221319,9 @@ async def index_osv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"osv\" + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -221392,7 +221393,7 @@ async def index_osv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221424,7 +221425,7 @@ async def index_osv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -221435,7 +221436,7 @@ async def index_osv_get_without_preload_content( return response_data.response - def _index_osv_get_serialize( + def _index_oracle_get_serialize( self, page, limit, @@ -221603,7 +221604,7 @@ def _index_osv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/osv', + resource_path='/v3/index/oracle', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -221620,7 +221621,7 @@ def _index_osv_get_serialize( @validate_call - async def index_otrs_get( + async def index_osv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221658,10 +221659,10 @@ async def index_otrs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination: - """Return vulnerability data stored in index \"otrs\" + ) -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination: + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -221733,7 +221734,7 @@ async def index_otrs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221765,7 +221766,7 @@ async def index_otrs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -221781,7 +221782,7 @@ async def index_otrs_get( @validate_call - async def index_otrs_get_with_http_info( + async def index_osv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221819,10 +221820,10 @@ async def index_otrs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination]: - """Return vulnerability data stored in index \"otrs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination]: + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -221894,7 +221895,7 @@ async def index_otrs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221926,7 +221927,7 @@ async def index_otrs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -221942,7 +221943,7 @@ async def index_otrs_get_with_http_info( @validate_call - async def index_otrs_get_without_preload_content( + async def index_osv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221981,9 +221982,9 @@ async def index_otrs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"otrs\" + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -222055,7 +222056,7 @@ async def index_otrs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222087,7 +222088,7 @@ async def index_otrs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -222098,7 +222099,7 @@ async def index_otrs_get_without_preload_content( return response_data.response - def _index_otrs_get_serialize( + def _index_osv_get_serialize( self, page, limit, @@ -222266,7 +222267,7 @@ def _index_otrs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/otrs', + resource_path='/v3/index/osv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -222283,7 +222284,7 @@ def _index_otrs_get_serialize( @validate_call - async def index_owncloud_get( + async def index_otrs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222321,10 +222322,10 @@ async def index_owncloud_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination: - """Return vulnerability data stored in index \"owncloud\" + ) -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination: + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -222396,7 +222397,7 @@ async def index_owncloud_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222428,7 +222429,7 @@ async def index_owncloud_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -222444,7 +222445,7 @@ async def index_owncloud_get( @validate_call - async def index_owncloud_get_with_http_info( + async def index_otrs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222482,10 +222483,10 @@ async def index_owncloud_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination]: - """Return vulnerability data stored in index \"owncloud\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination]: + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -222557,7 +222558,7 @@ async def index_owncloud_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222589,7 +222590,7 @@ async def index_owncloud_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -222605,7 +222606,7 @@ async def index_owncloud_get_with_http_info( @validate_call - async def index_owncloud_get_without_preload_content( + async def index_otrs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222644,9 +222645,9 @@ async def index_owncloud_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"owncloud\" + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -222718,7 +222719,7 @@ async def index_owncloud_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222750,7 +222751,7 @@ async def index_owncloud_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -222761,7 +222762,7 @@ async def index_owncloud_get_without_preload_content( return response_data.response - def _index_owncloud_get_serialize( + def _index_otrs_get_serialize( self, page, limit, @@ -222929,7 +222930,7 @@ def _index_owncloud_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/owncloud', + resource_path='/v3/index/otrs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -222946,7 +222947,7 @@ def _index_owncloud_get_serialize( @validate_call - async def index_packetstorm_get( + async def index_owncloud_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222984,10 +222985,10 @@ async def index_packetstorm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination: - """Return vulnerability data stored in index \"packetstorm\" + ) -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination: + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -223059,7 +223060,7 @@ async def index_packetstorm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223091,7 +223092,7 @@ async def index_packetstorm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -223107,7 +223108,7 @@ async def index_packetstorm_get( @validate_call - async def index_packetstorm_get_with_http_info( + async def index_owncloud_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223145,10 +223146,10 @@ async def index_packetstorm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination]: - """Return vulnerability data stored in index \"packetstorm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination]: + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -223220,7 +223221,7 @@ async def index_packetstorm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223252,7 +223253,7 @@ async def index_packetstorm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -223268,7 +223269,7 @@ async def index_packetstorm_get_with_http_info( @validate_call - async def index_packetstorm_get_without_preload_content( + async def index_owncloud_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223307,9 +223308,9 @@ async def index_packetstorm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"packetstorm\" + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -223381,7 +223382,7 @@ async def index_packetstorm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223413,7 +223414,7 @@ async def index_packetstorm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -223424,7 +223425,7 @@ async def index_packetstorm_get_without_preload_content( return response_data.response - def _index_packetstorm_get_serialize( + def _index_owncloud_get_serialize( self, page, limit, @@ -223592,7 +223593,7 @@ def _index_packetstorm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/packetstorm', + resource_path='/v3/index/owncloud', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -223609,7 +223610,7 @@ def _index_packetstorm_get_serialize( @validate_call - async def index_palantir_get( + async def index_packetstorm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223647,10 +223648,10 @@ async def index_palantir_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination: - """Return vulnerability data stored in index \"palantir\" + ) -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination: + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -223722,7 +223723,7 @@ async def index_palantir_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223754,7 +223755,7 @@ async def index_palantir_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -223770,7 +223771,7 @@ async def index_palantir_get( @validate_call - async def index_palantir_get_with_http_info( + async def index_packetstorm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223808,10 +223809,10 @@ async def index_palantir_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination]: - """Return vulnerability data stored in index \"palantir\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination]: + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -223883,7 +223884,7 @@ async def index_palantir_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223915,7 +223916,7 @@ async def index_palantir_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -223931,7 +223932,7 @@ async def index_palantir_get_with_http_info( @validate_call - async def index_palantir_get_without_preload_content( + async def index_packetstorm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223970,9 +223971,9 @@ async def index_palantir_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"palantir\" + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -224044,7 +224045,7 @@ async def index_palantir_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224076,7 +224077,7 @@ async def index_palantir_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -224087,7 +224088,7 @@ async def index_palantir_get_without_preload_content( return response_data.response - def _index_palantir_get_serialize( + def _index_packetstorm_get_serialize( self, page, limit, @@ -224255,7 +224256,7 @@ def _index_palantir_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/palantir', + resource_path='/v3/index/packetstorm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -224272,7 +224273,7 @@ def _index_palantir_get_serialize( @validate_call - async def index_palo_alto_get( + async def index_palantir_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224310,10 +224311,10 @@ async def index_palo_alto_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"palo-alto\" + ) -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination: + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -224385,7 +224386,7 @@ async def index_palo_alto_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224417,7 +224418,7 @@ async def index_palo_alto_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -224433,7 +224434,7 @@ async def index_palo_alto_get( @validate_call - async def index_palo_alto_get_with_http_info( + async def index_palantir_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224471,10 +224472,10 @@ async def index_palo_alto_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"palo-alto\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination]: + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -224546,7 +224547,7 @@ async def index_palo_alto_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224578,7 +224579,7 @@ async def index_palo_alto_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -224594,7 +224595,7 @@ async def index_palo_alto_get_with_http_info( @validate_call - async def index_palo_alto_get_without_preload_content( + async def index_palantir_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224633,9 +224634,9 @@ async def index_palo_alto_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"palo-alto\" + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -224707,7 +224708,7 @@ async def index_palo_alto_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224739,7 +224740,7 @@ async def index_palo_alto_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -224750,7 +224751,7 @@ async def index_palo_alto_get_without_preload_content( return response_data.response - def _index_palo_alto_get_serialize( + def _index_palantir_get_serialize( self, page, limit, @@ -224918,7 +224919,7 @@ def _index_palo_alto_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/palo-alto', + resource_path='/v3/index/palantir', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -224935,7 +224936,7 @@ def _index_palo_alto_get_serialize( @validate_call - async def index_panasonic_get( + async def index_palo_alto_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224973,10 +224974,10 @@ async def index_panasonic_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination: - """Return vulnerability data stored in index \"panasonic\" + ) -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -225048,7 +225049,7 @@ async def index_panasonic_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225080,7 +225081,7 @@ async def index_panasonic_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -225096,7 +225097,7 @@ async def index_panasonic_get( @validate_call - async def index_panasonic_get_with_http_info( + async def index_palo_alto_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225134,10 +225135,10 @@ async def index_panasonic_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination]: - """Return vulnerability data stored in index \"panasonic\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -225209,7 +225210,7 @@ async def index_panasonic_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225241,7 +225242,7 @@ async def index_panasonic_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -225257,7 +225258,7 @@ async def index_panasonic_get_with_http_info( @validate_call - async def index_panasonic_get_without_preload_content( + async def index_palo_alto_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225296,9 +225297,9 @@ async def index_panasonic_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"panasonic\" + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -225370,7 +225371,7 @@ async def index_panasonic_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225402,7 +225403,7 @@ async def index_panasonic_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -225413,7 +225414,7 @@ async def index_panasonic_get_without_preload_content( return response_data.response - def _index_panasonic_get_serialize( + def _index_palo_alto_get_serialize( self, page, limit, @@ -225581,7 +225582,7 @@ def _index_panasonic_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/panasonic', + resource_path='/v3/index/palo-alto', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -225598,7 +225599,7 @@ def _index_panasonic_get_serialize( @validate_call - async def index_papercut_get( + async def index_panasonic_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225636,10 +225637,10 @@ async def index_papercut_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination: - """Return vulnerability data stored in index \"papercut\" + ) -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination: + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -225711,7 +225712,7 @@ async def index_papercut_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225743,7 +225744,7 @@ async def index_papercut_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -225759,7 +225760,7 @@ async def index_papercut_get( @validate_call - async def index_papercut_get_with_http_info( + async def index_panasonic_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225797,10 +225798,10 @@ async def index_papercut_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination]: - """Return vulnerability data stored in index \"papercut\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination]: + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -225872,7 +225873,7 @@ async def index_papercut_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225904,7 +225905,7 @@ async def index_papercut_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -225920,7 +225921,7 @@ async def index_papercut_get_with_http_info( @validate_call - async def index_papercut_get_without_preload_content( + async def index_panasonic_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225959,9 +225960,9 @@ async def index_papercut_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"papercut\" + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -226033,7 +226034,7 @@ async def index_papercut_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226065,7 +226066,7 @@ async def index_papercut_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -226076,7 +226077,7 @@ async def index_papercut_get_without_preload_content( return response_data.response - def _index_papercut_get_serialize( + def _index_panasonic_get_serialize( self, page, limit, @@ -226244,7 +226245,7 @@ def _index_papercut_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/papercut', + resource_path='/v3/index/panasonic', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -226261,7 +226262,7 @@ def _index_papercut_get_serialize( @validate_call - async def index_pega_get( + async def index_papercut_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226299,10 +226300,10 @@ async def index_pega_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination: - """Return vulnerability data stored in index \"pega\" + ) -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination: + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -226374,7 +226375,7 @@ async def index_pega_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226406,7 +226407,7 @@ async def index_pega_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -226422,7 +226423,7 @@ async def index_pega_get( @validate_call - async def index_pega_get_with_http_info( + async def index_papercut_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226460,10 +226461,10 @@ async def index_pega_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination]: - """Return vulnerability data stored in index \"pega\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination]: + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -226535,7 +226536,7 @@ async def index_pega_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226567,7 +226568,7 @@ async def index_pega_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -226583,7 +226584,7 @@ async def index_pega_get_with_http_info( @validate_call - async def index_pega_get_without_preload_content( + async def index_papercut_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226622,9 +226623,9 @@ async def index_pega_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pega\" + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -226696,7 +226697,7 @@ async def index_pega_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226728,7 +226729,7 @@ async def index_pega_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -226739,7 +226740,7 @@ async def index_pega_get_without_preload_content( return response_data.response - def _index_pega_get_serialize( + def _index_papercut_get_serialize( self, page, limit, @@ -226907,7 +226908,7 @@ def _index_pega_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pega', + resource_path='/v3/index/papercut', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -226924,7 +226925,7 @@ def _index_pega_get_serialize( @validate_call - async def index_philips_get( + async def index_pega_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226962,10 +226963,10 @@ async def index_philips_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"philips\" + ) -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination: + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -227037,7 +227038,7 @@ async def index_philips_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227069,7 +227070,7 @@ async def index_philips_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -227085,7 +227086,7 @@ async def index_philips_get( @validate_call - async def index_philips_get_with_http_info( + async def index_pega_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227123,10 +227124,10 @@ async def index_philips_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"philips\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination]: + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -227198,7 +227199,7 @@ async def index_philips_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227230,7 +227231,7 @@ async def index_philips_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -227246,7 +227247,7 @@ async def index_philips_get_with_http_info( @validate_call - async def index_philips_get_without_preload_content( + async def index_pega_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227285,9 +227286,9 @@ async def index_philips_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"philips\" + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -227359,7 +227360,7 @@ async def index_philips_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227391,7 +227392,7 @@ async def index_philips_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -227402,7 +227403,7 @@ async def index_philips_get_without_preload_content( return response_data.response - def _index_philips_get_serialize( + def _index_pega_get_serialize( self, page, limit, @@ -227570,7 +227571,7 @@ def _index_philips_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/philips', + resource_path='/v3/index/pega', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -227587,7 +227588,7 @@ def _index_philips_get_serialize( @validate_call - async def index_phoenix_contact_get( + async def index_philips_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227625,10 +227626,10 @@ async def index_phoenix_contact_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"phoenix-contact\" + ) -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -227700,7 +227701,7 @@ async def index_phoenix_contact_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227732,7 +227733,7 @@ async def index_phoenix_contact_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -227748,7 +227749,7 @@ async def index_phoenix_contact_get( @validate_call - async def index_phoenix_contact_get_with_http_info( + async def index_philips_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227786,10 +227787,10 @@ async def index_phoenix_contact_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"phoenix-contact\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -227861,7 +227862,7 @@ async def index_phoenix_contact_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227893,7 +227894,7 @@ async def index_phoenix_contact_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -227909,7 +227910,7 @@ async def index_phoenix_contact_get_with_http_info( @validate_call - async def index_phoenix_contact_get_without_preload_content( + async def index_philips_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227948,9 +227949,9 @@ async def index_phoenix_contact_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"phoenix-contact\" + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -228022,7 +228023,7 @@ async def index_phoenix_contact_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228054,7 +228055,7 @@ async def index_phoenix_contact_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -228065,7 +228066,7 @@ async def index_phoenix_contact_get_without_preload_content( return response_data.response - def _index_phoenix_contact_get_serialize( + def _index_philips_get_serialize( self, page, limit, @@ -228233,7 +228234,7 @@ def _index_phoenix_contact_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/phoenix-contact', + resource_path='/v3/index/philips', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -228250,7 +228251,7 @@ def _index_phoenix_contact_get_serialize( @validate_call - async def index_php_my_admin_get( + async def index_phoenix_contact_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228288,10 +228289,10 @@ async def index_php_my_admin_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination: - """Return vulnerability data stored in index \"php-my-admin\" + ) -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -228363,7 +228364,7 @@ async def index_php_my_admin_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228395,7 +228396,7 @@ async def index_php_my_admin_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -228411,7 +228412,7 @@ async def index_php_my_admin_get( @validate_call - async def index_php_my_admin_get_with_http_info( + async def index_phoenix_contact_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228449,10 +228450,10 @@ async def index_php_my_admin_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination]: - """Return vulnerability data stored in index \"php-my-admin\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -228524,7 +228525,7 @@ async def index_php_my_admin_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228556,7 +228557,7 @@ async def index_php_my_admin_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -228572,7 +228573,7 @@ async def index_php_my_admin_get_with_http_info( @validate_call - async def index_php_my_admin_get_without_preload_content( + async def index_phoenix_contact_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228611,9 +228612,9 @@ async def index_php_my_admin_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"php-my-admin\" + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -228685,7 +228686,7 @@ async def index_php_my_admin_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228717,7 +228718,7 @@ async def index_php_my_admin_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -228728,7 +228729,7 @@ async def index_php_my_admin_get_without_preload_content( return response_data.response - def _index_php_my_admin_get_serialize( + def _index_phoenix_contact_get_serialize( self, page, limit, @@ -228896,7 +228897,7 @@ def _index_php_my_admin_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/php-my-admin', + resource_path='/v3/index/phoenix-contact', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -228913,7 +228914,7 @@ def _index_php_my_admin_get_serialize( @validate_call - async def index_pkcert_get( + async def index_php_my_admin_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228951,10 +228952,10 @@ async def index_pkcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination: - """Return vulnerability data stored in index \"pkcert\" + ) -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination: + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -229026,7 +229027,7 @@ async def index_pkcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229058,7 +229059,7 @@ async def index_pkcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -229074,7 +229075,7 @@ async def index_pkcert_get( @validate_call - async def index_pkcert_get_with_http_info( + async def index_php_my_admin_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229112,10 +229113,10 @@ async def index_pkcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination]: - """Return vulnerability data stored in index \"pkcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination]: + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -229187,7 +229188,7 @@ async def index_pkcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229219,7 +229220,7 @@ async def index_pkcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -229235,7 +229236,7 @@ async def index_pkcert_get_with_http_info( @validate_call - async def index_pkcert_get_without_preload_content( + async def index_php_my_admin_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229274,9 +229275,9 @@ async def index_pkcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pkcert\" + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -229348,7 +229349,7 @@ async def index_pkcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229380,7 +229381,7 @@ async def index_pkcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -229391,7 +229392,7 @@ async def index_pkcert_get_without_preload_content( return response_data.response - def _index_pkcert_get_serialize( + def _index_php_my_admin_get_serialize( self, page, limit, @@ -229559,7 +229560,7 @@ def _index_pkcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pkcert', + resource_path='/v3/index/php-my-admin', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -229576,7 +229577,7 @@ def _index_pkcert_get_serialize( @validate_call - async def index_postgressql_get( + async def index_pkcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229614,10 +229615,10 @@ async def index_postgressql_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination: - """Return vulnerability data stored in index \"postgressql\" + ) -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination: + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -229689,7 +229690,7 @@ async def index_postgressql_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229721,7 +229722,7 @@ async def index_postgressql_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -229737,7 +229738,7 @@ async def index_postgressql_get( @validate_call - async def index_postgressql_get_with_http_info( + async def index_pkcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229775,10 +229776,10 @@ async def index_postgressql_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination]: - """Return vulnerability data stored in index \"postgressql\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination]: + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -229850,7 +229851,7 @@ async def index_postgressql_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229882,7 +229883,7 @@ async def index_postgressql_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -229898,7 +229899,7 @@ async def index_postgressql_get_with_http_info( @validate_call - async def index_postgressql_get_without_preload_content( + async def index_pkcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229937,9 +229938,9 @@ async def index_postgressql_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"postgressql\" + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -230011,7 +230012,7 @@ async def index_postgressql_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230043,7 +230044,7 @@ async def index_postgressql_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -230054,7 +230055,7 @@ async def index_postgressql_get_without_preload_content( return response_data.response - def _index_postgressql_get_serialize( + def _index_pkcert_get_serialize( self, page, limit, @@ -230222,7 +230223,7 @@ def _index_postgressql_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/postgressql', + resource_path='/v3/index/pkcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -230239,7 +230240,7 @@ def _index_postgressql_get_serialize( @validate_call - async def index_powerdns_get( + async def index_postgressql_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230277,10 +230278,10 @@ async def index_powerdns_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination: - """Return vulnerability data stored in index \"powerdns\" + ) -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination: + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -230352,7 +230353,7 @@ async def index_powerdns_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230384,7 +230385,7 @@ async def index_powerdns_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -230400,7 +230401,7 @@ async def index_powerdns_get( @validate_call - async def index_powerdns_get_with_http_info( + async def index_postgressql_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230438,10 +230439,10 @@ async def index_powerdns_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination]: - """Return vulnerability data stored in index \"powerdns\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination]: + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -230513,7 +230514,7 @@ async def index_powerdns_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230545,7 +230546,7 @@ async def index_powerdns_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -230561,7 +230562,7 @@ async def index_powerdns_get_with_http_info( @validate_call - async def index_powerdns_get_without_preload_content( + async def index_postgressql_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230600,9 +230601,9 @@ async def index_powerdns_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"powerdns\" + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -230674,7 +230675,7 @@ async def index_powerdns_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230706,7 +230707,7 @@ async def index_powerdns_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -230717,7 +230718,7 @@ async def index_powerdns_get_without_preload_content( return response_data.response - def _index_powerdns_get_serialize( + def _index_postgressql_get_serialize( self, page, limit, @@ -230885,7 +230886,7 @@ def _index_powerdns_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/powerdns', + resource_path='/v3/index/postgressql', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -230902,7 +230903,7 @@ def _index_powerdns_get_serialize( @validate_call - async def index_progress_get( + async def index_powerdns_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230940,10 +230941,10 @@ async def index_progress_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination: - """Return vulnerability data stored in index \"progress\" + ) -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination: + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -231015,7 +231016,7 @@ async def index_progress_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231047,7 +231048,7 @@ async def index_progress_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -231063,7 +231064,7 @@ async def index_progress_get( @validate_call - async def index_progress_get_with_http_info( + async def index_powerdns_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231101,10 +231102,10 @@ async def index_progress_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination]: - """Return vulnerability data stored in index \"progress\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination]: + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -231176,7 +231177,7 @@ async def index_progress_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231208,7 +231209,7 @@ async def index_progress_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -231224,7 +231225,7 @@ async def index_progress_get_with_http_info( @validate_call - async def index_progress_get_without_preload_content( + async def index_powerdns_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231263,9 +231264,9 @@ async def index_progress_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"progress\" + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -231337,7 +231338,7 @@ async def index_progress_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231369,7 +231370,7 @@ async def index_progress_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -231380,7 +231381,7 @@ async def index_progress_get_without_preload_content( return response_data.response - def _index_progress_get_serialize( + def _index_powerdns_get_serialize( self, page, limit, @@ -231548,7 +231549,7 @@ def _index_progress_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/progress', + resource_path='/v3/index/powerdns', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -231565,7 +231566,7 @@ def _index_progress_get_serialize( @validate_call - async def index_proofpoint_get( + async def index_progress_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231603,10 +231604,10 @@ async def index_proofpoint_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination: - """Return vulnerability data stored in index \"proofpoint\" + ) -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination: + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -231678,7 +231679,7 @@ async def index_proofpoint_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231710,7 +231711,7 @@ async def index_proofpoint_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -231726,7 +231727,7 @@ async def index_proofpoint_get( @validate_call - async def index_proofpoint_get_with_http_info( + async def index_progress_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231764,10 +231765,10 @@ async def index_proofpoint_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination]: - """Return vulnerability data stored in index \"proofpoint\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination]: + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -231839,7 +231840,7 @@ async def index_proofpoint_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231871,7 +231872,7 @@ async def index_proofpoint_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -231887,7 +231888,7 @@ async def index_proofpoint_get_with_http_info( @validate_call - async def index_proofpoint_get_without_preload_content( + async def index_progress_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231926,9 +231927,9 @@ async def index_proofpoint_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"proofpoint\" + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -232000,7 +232001,7 @@ async def index_proofpoint_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232032,7 +232033,7 @@ async def index_proofpoint_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -232043,7 +232044,7 @@ async def index_proofpoint_get_without_preload_content( return response_data.response - def _index_proofpoint_get_serialize( + def _index_progress_get_serialize( self, page, limit, @@ -232211,7 +232212,7 @@ def _index_proofpoint_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/proofpoint', + resource_path='/v3/index/progress', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -232228,7 +232229,7 @@ def _index_proofpoint_get_serialize( @validate_call - async def index_ptc_get( + async def index_proofpoint_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232266,10 +232267,10 @@ async def index_ptc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination: - """Return vulnerability data stored in index \"ptc\" + ) -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination: + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -232341,7 +232342,7 @@ async def index_ptc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232373,7 +232374,7 @@ async def index_ptc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -232389,7 +232390,7 @@ async def index_ptc_get( @validate_call - async def index_ptc_get_with_http_info( + async def index_proofpoint_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232427,10 +232428,10 @@ async def index_ptc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination]: - """Return vulnerability data stored in index \"ptc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination]: + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -232502,7 +232503,7 @@ async def index_ptc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232534,7 +232535,7 @@ async def index_ptc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -232550,7 +232551,7 @@ async def index_ptc_get_with_http_info( @validate_call - async def index_ptc_get_without_preload_content( + async def index_proofpoint_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232589,9 +232590,9 @@ async def index_ptc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ptc\" + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -232663,7 +232664,7 @@ async def index_ptc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232695,7 +232696,7 @@ async def index_ptc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -232706,7 +232707,7 @@ async def index_ptc_get_without_preload_content( return response_data.response - def _index_ptc_get_serialize( + def _index_proofpoint_get_serialize( self, page, limit, @@ -232874,7 +232875,7 @@ def _index_ptc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ptc', + resource_path='/v3/index/proofpoint', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -232891,7 +232892,7 @@ def _index_ptc_get_serialize( @validate_call - async def index_pub_get( + async def index_ptc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232929,10 +232930,10 @@ async def index_pub_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"pub\" + ) -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination: + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -233004,7 +233005,7 @@ async def index_pub_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233036,7 +233037,7 @@ async def index_pub_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -233052,7 +233053,7 @@ async def index_pub_get( @validate_call - async def index_pub_get_with_http_info( + async def index_ptc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233090,10 +233091,10 @@ async def index_pub_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"pub\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination]: + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -233165,7 +233166,7 @@ async def index_pub_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233197,7 +233198,7 @@ async def index_pub_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -233213,7 +233214,7 @@ async def index_pub_get_with_http_info( @validate_call - async def index_pub_get_without_preload_content( + async def index_ptc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233252,9 +233253,9 @@ async def index_pub_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pub\" + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -233326,7 +233327,7 @@ async def index_pub_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233358,7 +233359,7 @@ async def index_pub_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -233369,7 +233370,7 @@ async def index_pub_get_without_preload_content( return response_data.response - def _index_pub_get_serialize( + def _index_ptc_get_serialize( self, page, limit, @@ -233537,7 +233538,7 @@ def _index_pub_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pub', + resource_path='/v3/index/ptc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -233554,7 +233555,7 @@ def _index_pub_get_serialize( @validate_call - async def index_pure_storage_get( + async def index_pub_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233592,10 +233593,10 @@ async def index_pure_storage_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination: - """Return vulnerability data stored in index \"pure-storage\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -233667,7 +233668,7 @@ async def index_pure_storage_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233699,7 +233700,7 @@ async def index_pure_storage_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -233715,7 +233716,7 @@ async def index_pure_storage_get( @validate_call - async def index_pure_storage_get_with_http_info( + async def index_pub_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233753,10 +233754,10 @@ async def index_pure_storage_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination]: - """Return vulnerability data stored in index \"pure-storage\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -233828,7 +233829,7 @@ async def index_pure_storage_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233860,7 +233861,7 @@ async def index_pure_storage_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -233876,7 +233877,7 @@ async def index_pure_storage_get_with_http_info( @validate_call - async def index_pure_storage_get_without_preload_content( + async def index_pub_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233915,9 +233916,9 @@ async def index_pure_storage_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pure-storage\" + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -233989,7 +233990,7 @@ async def index_pure_storage_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234021,7 +234022,7 @@ async def index_pure_storage_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -234032,7 +234033,7 @@ async def index_pure_storage_get_without_preload_content( return response_data.response - def _index_pure_storage_get_serialize( + def _index_pub_get_serialize( self, page, limit, @@ -234200,7 +234201,7 @@ def _index_pure_storage_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pure-storage', + resource_path='/v3/index/pub', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -234217,7 +234218,7 @@ def _index_pure_storage_get_serialize( @validate_call - async def index_pypa_advisories_get( + async def index_pure_storage_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234255,10 +234256,10 @@ async def index_pypa_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"pypa-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination: + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -234330,7 +234331,7 @@ async def index_pypa_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234362,7 +234363,7 @@ async def index_pypa_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -234378,7 +234379,7 @@ async def index_pypa_advisories_get( @validate_call - async def index_pypa_advisories_get_with_http_info( + async def index_pure_storage_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234416,10 +234417,10 @@ async def index_pypa_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"pypa-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination]: + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -234491,7 +234492,7 @@ async def index_pypa_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234523,7 +234524,7 @@ async def index_pypa_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -234539,7 +234540,7 @@ async def index_pypa_advisories_get_with_http_info( @validate_call - async def index_pypa_advisories_get_without_preload_content( + async def index_pure_storage_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234578,9 +234579,9 @@ async def index_pypa_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pypa-advisories\" + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -234652,7 +234653,7 @@ async def index_pypa_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234684,7 +234685,7 @@ async def index_pypa_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -234695,7 +234696,7 @@ async def index_pypa_advisories_get_without_preload_content( return response_data.response - def _index_pypa_advisories_get_serialize( + def _index_pure_storage_get_serialize( self, page, limit, @@ -234863,7 +234864,7 @@ def _index_pypa_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pypa-advisories', + resource_path='/v3/index/pure-storage', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -234880,7 +234881,7 @@ def _index_pypa_advisories_get_serialize( @validate_call - async def index_pypi_get( + async def index_pypa_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234918,10 +234919,10 @@ async def index_pypi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"pypi\" + ) -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -234993,7 +234994,7 @@ async def index_pypi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235025,7 +235026,7 @@ async def index_pypi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -235041,7 +235042,7 @@ async def index_pypi_get( @validate_call - async def index_pypi_get_with_http_info( + async def index_pypa_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235079,10 +235080,10 @@ async def index_pypi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"pypi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -235154,7 +235155,7 @@ async def index_pypi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235186,7 +235187,7 @@ async def index_pypi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -235202,7 +235203,7 @@ async def index_pypi_get_with_http_info( @validate_call - async def index_pypi_get_without_preload_content( + async def index_pypa_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235241,9 +235242,9 @@ async def index_pypi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pypi\" + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -235315,7 +235316,7 @@ async def index_pypi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235347,7 +235348,7 @@ async def index_pypi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -235358,7 +235359,7 @@ async def index_pypi_get_without_preload_content( return response_data.response - def _index_pypi_get_serialize( + def _index_pypa_advisories_get_serialize( self, page, limit, @@ -235526,7 +235527,7 @@ def _index_pypi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pypi', + resource_path='/v3/index/pypa-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -235543,7 +235544,7 @@ def _index_pypi_get_serialize( @validate_call - async def index_qnap_get( + async def index_pypi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235581,10 +235582,10 @@ async def index_qnap_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"qnap\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -235656,7 +235657,7 @@ async def index_qnap_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235688,7 +235689,7 @@ async def index_qnap_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -235704,7 +235705,7 @@ async def index_qnap_get( @validate_call - async def index_qnap_get_with_http_info( + async def index_pypi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235742,10 +235743,10 @@ async def index_qnap_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"qnap\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -235817,7 +235818,7 @@ async def index_qnap_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235849,7 +235850,7 @@ async def index_qnap_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -235865,7 +235866,7 @@ async def index_qnap_get_with_http_info( @validate_call - async def index_qnap_get_without_preload_content( + async def index_pypi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235904,9 +235905,9 @@ async def index_qnap_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qnap\" + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -235978,7 +235979,7 @@ async def index_qnap_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236010,7 +236011,7 @@ async def index_qnap_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -236021,7 +236022,7 @@ async def index_qnap_get_without_preload_content( return response_data.response - def _index_qnap_get_serialize( + def _index_pypi_get_serialize( self, page, limit, @@ -236189,7 +236190,7 @@ def _index_qnap_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qnap', + resource_path='/v3/index/pypi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -236206,7 +236207,7 @@ def _index_qnap_get_serialize( @validate_call - async def index_qqids_get( + async def index_qnap_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236244,10 +236245,10 @@ async def index_qqids_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination: - """Return vulnerability data stored in index \"qqids\" + ) -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -236319,7 +236320,7 @@ async def index_qqids_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236351,7 +236352,7 @@ async def index_qqids_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -236367,7 +236368,7 @@ async def index_qqids_get( @validate_call - async def index_qqids_get_with_http_info( + async def index_qnap_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236405,10 +236406,10 @@ async def index_qqids_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination]: - """Return vulnerability data stored in index \"qqids\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -236480,7 +236481,7 @@ async def index_qqids_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236512,7 +236513,7 @@ async def index_qqids_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -236528,7 +236529,7 @@ async def index_qqids_get_with_http_info( @validate_call - async def index_qqids_get_without_preload_content( + async def index_qnap_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236567,9 +236568,9 @@ async def index_qqids_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qqids\" + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -236641,7 +236642,7 @@ async def index_qqids_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236673,7 +236674,7 @@ async def index_qqids_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -236684,7 +236685,7 @@ async def index_qqids_get_without_preload_content( return response_data.response - def _index_qqids_get_serialize( + def _index_qnap_get_serialize( self, page, limit, @@ -236852,7 +236853,7 @@ def _index_qqids_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qqids', + resource_path='/v3/index/qnap', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -236869,7 +236870,7 @@ def _index_qqids_get_serialize( @validate_call - async def index_qualcomm_get( + async def index_qqids_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236907,10 +236908,10 @@ async def index_qualcomm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination: - """Return vulnerability data stored in index \"qualcomm\" + ) -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination: + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -236982,7 +236983,7 @@ async def index_qualcomm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237014,7 +237015,7 @@ async def index_qualcomm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -237030,7 +237031,7 @@ async def index_qualcomm_get( @validate_call - async def index_qualcomm_get_with_http_info( + async def index_qqids_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237068,10 +237069,10 @@ async def index_qualcomm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination]: - """Return vulnerability data stored in index \"qualcomm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination]: + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -237143,7 +237144,7 @@ async def index_qualcomm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237175,7 +237176,7 @@ async def index_qualcomm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -237191,7 +237192,7 @@ async def index_qualcomm_get_with_http_info( @validate_call - async def index_qualcomm_get_without_preload_content( + async def index_qqids_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237230,9 +237231,9 @@ async def index_qualcomm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualcomm\" + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -237304,7 +237305,7 @@ async def index_qualcomm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237336,7 +237337,7 @@ async def index_qualcomm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -237347,7 +237348,7 @@ async def index_qualcomm_get_without_preload_content( return response_data.response - def _index_qualcomm_get_serialize( + def _index_qqids_get_serialize( self, page, limit, @@ -237515,7 +237516,7 @@ def _index_qualcomm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qualcomm', + resource_path='/v3/index/qqids', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -237532,7 +237533,7 @@ def _index_qualcomm_get_serialize( @validate_call - async def index_qualys_get( + async def index_qualcomm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237570,10 +237571,10 @@ async def index_qualys_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination: - """Return vulnerability data stored in index \"qualys\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination: + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -237645,7 +237646,7 @@ async def index_qualys_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237677,7 +237678,7 @@ async def index_qualys_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -237693,7 +237694,7 @@ async def index_qualys_get( @validate_call - async def index_qualys_get_with_http_info( + async def index_qualcomm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237731,10 +237732,10 @@ async def index_qualys_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination]: - """Return vulnerability data stored in index \"qualys\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination]: + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -237806,7 +237807,7 @@ async def index_qualys_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237838,7 +237839,7 @@ async def index_qualys_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -237854,7 +237855,7 @@ async def index_qualys_get_with_http_info( @validate_call - async def index_qualys_get_without_preload_content( + async def index_qualcomm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237893,9 +237894,9 @@ async def index_qualys_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualys\" + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -237967,7 +237968,7 @@ async def index_qualys_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237999,7 +238000,7 @@ async def index_qualys_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -238010,7 +238011,7 @@ async def index_qualys_get_without_preload_content( return response_data.response - def _index_qualys_get_serialize( + def _index_qualcomm_get_serialize( self, page, limit, @@ -238178,7 +238179,7 @@ def _index_qualys_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qualys', + resource_path='/v3/index/qualcomm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -238195,7 +238196,7 @@ def _index_qualys_get_serialize( @validate_call - async def index_qualys_qids_get( + async def index_qualys_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238233,10 +238234,10 @@ async def index_qualys_qids_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination: - """Return vulnerability data stored in index \"qualys-qids\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination: + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -238308,7 +238309,7 @@ async def index_qualys_qids_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238340,7 +238341,7 @@ async def index_qualys_qids_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -238356,7 +238357,7 @@ async def index_qualys_qids_get( @validate_call - async def index_qualys_qids_get_with_http_info( + async def index_qualys_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238394,10 +238395,10 @@ async def index_qualys_qids_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination]: - """Return vulnerability data stored in index \"qualys-qids\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination]: + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -238469,7 +238470,7 @@ async def index_qualys_qids_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238501,7 +238502,7 @@ async def index_qualys_qids_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -238517,7 +238518,7 @@ async def index_qualys_qids_get_with_http_info( @validate_call - async def index_qualys_qids_get_without_preload_content( + async def index_qualys_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238556,9 +238557,9 @@ async def index_qualys_qids_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualys-qids\" + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -238630,7 +238631,7 @@ async def index_qualys_qids_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238662,7 +238663,7 @@ async def index_qualys_qids_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -238673,7 +238674,7 @@ async def index_qualys_qids_get_without_preload_content( return response_data.response - def _index_qualys_qids_get_serialize( + def _index_qualys_get_serialize( self, page, limit, @@ -238841,7 +238842,7 @@ def _index_qualys_qids_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qualys-qids', + resource_path='/v3/index/qualys', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -238858,7 +238859,7 @@ def _index_qualys_qids_get_serialize( @validate_call - async def index_qubes_qsb_get( + async def index_qualys_qids_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238896,10 +238897,10 @@ async def index_qubes_qsb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination: - """Return vulnerability data stored in index \"qubes-qsb\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination: + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -238971,7 +238972,7 @@ async def index_qubes_qsb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239003,7 +239004,7 @@ async def index_qubes_qsb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -239019,7 +239020,7 @@ async def index_qubes_qsb_get( @validate_call - async def index_qubes_qsb_get_with_http_info( + async def index_qualys_qids_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239057,10 +239058,10 @@ async def index_qubes_qsb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination]: - """Return vulnerability data stored in index \"qubes-qsb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination]: + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -239132,7 +239133,7 @@ async def index_qubes_qsb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239164,7 +239165,7 @@ async def index_qubes_qsb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -239180,7 +239181,7 @@ async def index_qubes_qsb_get_with_http_info( @validate_call - async def index_qubes_qsb_get_without_preload_content( + async def index_qualys_qids_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239219,9 +239220,9 @@ async def index_qubes_qsb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qubes-qsb\" + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -239293,7 +239294,7 @@ async def index_qubes_qsb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239325,7 +239326,7 @@ async def index_qubes_qsb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -239336,7 +239337,7 @@ async def index_qubes_qsb_get_without_preload_content( return response_data.response - def _index_qubes_qsb_get_serialize( + def _index_qualys_qids_get_serialize( self, page, limit, @@ -239504,7 +239505,7 @@ def _index_qubes_qsb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qubes-qsb', + resource_path='/v3/index/qualys-qids', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -239521,7 +239522,7 @@ def _index_qubes_qsb_get_serialize( @validate_call - async def index_ransomware_get( + async def index_qubes_qsb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239559,10 +239560,10 @@ async def index_ransomware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination: - """Return vulnerability data stored in index \"ransomware\" + ) -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination: + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -239634,7 +239635,7 @@ async def index_ransomware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239666,7 +239667,7 @@ async def index_ransomware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -239682,7 +239683,7 @@ async def index_ransomware_get( @validate_call - async def index_ransomware_get_with_http_info( + async def index_qubes_qsb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239720,10 +239721,10 @@ async def index_ransomware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination]: - """Return vulnerability data stored in index \"ransomware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination]: + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -239795,7 +239796,7 @@ async def index_ransomware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239827,7 +239828,7 @@ async def index_ransomware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -239843,7 +239844,7 @@ async def index_ransomware_get_with_http_info( @validate_call - async def index_ransomware_get_without_preload_content( + async def index_qubes_qsb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239882,9 +239883,9 @@ async def index_ransomware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ransomware\" + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -239956,7 +239957,7 @@ async def index_ransomware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239988,7 +239989,7 @@ async def index_ransomware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -239999,7 +240000,7 @@ async def index_ransomware_get_without_preload_content( return response_data.response - def _index_ransomware_get_serialize( + def _index_qubes_qsb_get_serialize( self, page, limit, @@ -240167,7 +240168,7 @@ def _index_ransomware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ransomware', + resource_path='/v3/index/qubes-qsb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -240184,7 +240185,7 @@ def _index_ransomware_get_serialize( @validate_call - async def index_red_lion_get( + async def index_ransomware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240222,10 +240223,10 @@ async def index_red_lion_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination: - """Return vulnerability data stored in index \"red-lion\" + ) -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination: + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -240297,7 +240298,7 @@ async def index_red_lion_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_red_lion_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240329,7 +240330,7 @@ async def index_red_lion_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -240345,7 +240346,7 @@ async def index_red_lion_get( @validate_call - async def index_red_lion_get_with_http_info( + async def index_ransomware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240383,10 +240384,10 @@ async def index_red_lion_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination]: - """Return vulnerability data stored in index \"red-lion\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination]: + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -240458,7 +240459,7 @@ async def index_red_lion_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_red_lion_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240490,7 +240491,7 @@ async def index_red_lion_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -240506,7 +240507,7 @@ async def index_red_lion_get_with_http_info( @validate_call - async def index_red_lion_get_without_preload_content( + async def index_ransomware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240545,9 +240546,9 @@ async def index_red_lion_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"red-lion\" + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -240619,7 +240620,7 @@ async def index_red_lion_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_red_lion_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240651,7 +240652,7 @@ async def index_red_lion_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -240662,7 +240663,7 @@ async def index_red_lion_get_without_preload_content( return response_data.response - def _index_red_lion_get_serialize( + def _index_ransomware_get_serialize( self, page, limit, @@ -240830,7 +240831,7 @@ def _index_red_lion_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/red-lion', + resource_path='/v3/index/ransomware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -240847,7 +240848,7 @@ def _index_red_lion_get_serialize( @validate_call - async def index_redhat_cves_get( + async def index_red_lion_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240885,10 +240886,10 @@ async def index_redhat_cves_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination: - """Return vulnerability data stored in index \"redhat-cves\" + ) -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination: + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -240960,7 +240961,7 @@ async def index_redhat_cves_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_cves_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240992,7 +240993,7 @@ async def index_redhat_cves_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -241008,7 +241009,7 @@ async def index_redhat_cves_get( @validate_call - async def index_redhat_cves_get_with_http_info( + async def index_red_lion_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241046,10 +241047,10 @@ async def index_redhat_cves_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination]: - """Return vulnerability data stored in index \"redhat-cves\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination]: + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -241121,7 +241122,7 @@ async def index_redhat_cves_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_cves_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241153,7 +241154,7 @@ async def index_redhat_cves_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -241169,7 +241170,7 @@ async def index_redhat_cves_get_with_http_info( @validate_call - async def index_redhat_cves_get_without_preload_content( + async def index_red_lion_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241208,9 +241209,9 @@ async def index_redhat_cves_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"redhat-cves\" + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -241282,7 +241283,7 @@ async def index_redhat_cves_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_cves_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241314,7 +241315,7 @@ async def index_redhat_cves_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -241325,7 +241326,7 @@ async def index_redhat_cves_get_without_preload_content( return response_data.response - def _index_redhat_cves_get_serialize( + def _index_red_lion_get_serialize( self, page, limit, @@ -241493,7 +241494,7 @@ def _index_redhat_cves_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/redhat-cves', + resource_path='/v3/index/red-lion', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -241510,7 +241511,7 @@ def _index_redhat_cves_get_serialize( @validate_call - async def index_redhat_get( + async def index_redhat_cves_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241548,10 +241549,10 @@ async def index_redhat_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination: - """Return vulnerability data stored in index \"redhat\" + ) -> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination: + """Return vulnerability data stored in index \"redhat-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` :param page: set the page number of the response :type page: int @@ -241623,7 +241624,7 @@ async def index_redhat_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_get_serialize( + _param = self._index_redhat_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241655,7 +241656,7 @@ async def index_redhat_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", '404': "str", '500': "str", } @@ -241671,7 +241672,7 @@ async def index_redhat_get( @validate_call - async def index_redhat_get_with_http_info( + async def index_redhat_cves_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241709,10 +241710,10 @@ async def index_redhat_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination]: - """Return vulnerability data stored in index \"redhat\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination]: + """Return vulnerability data stored in index \"redhat-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` :param page: set the page number of the response :type page: int @@ -241784,7 +241785,7 @@ async def index_redhat_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_get_serialize( + _param = self._index_redhat_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241816,7 +241817,7 @@ async def index_redhat_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", '404': "str", '500': "str", } @@ -241832,7 +241833,7 @@ async def index_redhat_get_with_http_info( @validate_call - async def index_redhat_get_without_preload_content( + async def index_redhat_cves_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241871,9 +241872,9 @@ async def index_redhat_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"redhat\" + """Return vulnerability data stored in index \"redhat-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` :param page: set the page number of the response :type page: int @@ -241945,7 +241946,7 @@ async def index_redhat_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_get_serialize( + _param = self._index_redhat_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241977,7 +241978,7 @@ async def index_redhat_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", '404': "str", '500': "str", } @@ -241988,7 +241989,7 @@ async def index_redhat_get_without_preload_content( return response_data.response - def _index_redhat_get_serialize( + def _index_redhat_cves_get_serialize( self, page, limit, @@ -242156,7 +242157,7 @@ def _index_redhat_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/redhat', + resource_path='/v3/index/redhat-cves', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -242173,7 +242174,7 @@ def _index_redhat_get_serialize( @validate_call - async def index_renesas_get( + async def index_redhat_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242211,10 +242212,10 @@ async def index_renesas_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination: - """Return vulnerability data stored in index \"renesas\" + ) -> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination: + """Return vulnerability data stored in index \"redhat\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` :param page: set the page number of the response :type page: int @@ -242286,7 +242287,7 @@ async def index_renesas_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_renesas_get_serialize( + _param = self._index_redhat_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242318,7 +242319,7 @@ async def index_renesas_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", '404': "str", '500': "str", } @@ -242334,7 +242335,7 @@ async def index_renesas_get( @validate_call - async def index_renesas_get_with_http_info( + async def index_redhat_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242372,10 +242373,10 @@ async def index_renesas_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination]: - """Return vulnerability data stored in index \"renesas\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination]: + """Return vulnerability data stored in index \"redhat\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` :param page: set the page number of the response :type page: int @@ -242447,7 +242448,7 @@ async def index_renesas_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_renesas_get_serialize( + _param = self._index_redhat_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242479,7 +242480,7 @@ async def index_renesas_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", '404': "str", '500': "str", } @@ -242495,7 +242496,7 @@ async def index_renesas_get_with_http_info( @validate_call - async def index_renesas_get_without_preload_content( + async def index_redhat_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242534,9 +242535,9 @@ async def index_renesas_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"renesas\" + """Return vulnerability data stored in index \"redhat\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` :param page: set the page number of the response :type page: int @@ -242608,7 +242609,7 @@ async def index_renesas_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_renesas_get_serialize( + _param = self._index_redhat_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242640,7 +242641,7 @@ async def index_renesas_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", '404': "str", '500': "str", } @@ -242651,7 +242652,7 @@ async def index_renesas_get_without_preload_content( return response_data.response - def _index_renesas_get_serialize( + def _index_redhat_get_serialize( self, page, limit, @@ -242819,7 +242820,7 @@ def _index_renesas_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/renesas', + resource_path='/v3/index/redhat', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -242836,7 +242837,7 @@ def _index_renesas_get_serialize( @validate_call - async def index_revive_get( + async def index_renesas_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242874,10 +242875,10 @@ async def index_revive_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination: - """Return vulnerability data stored in index \"revive\" + ) -> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination: + """Return vulnerability data stored in index \"renesas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` :param page: set the page number of the response :type page: int @@ -242949,7 +242950,7 @@ async def index_revive_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_revive_get_serialize( + _param = self._index_renesas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242981,7 +242982,7 @@ async def index_revive_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", '404': "str", '500': "str", } @@ -242997,7 +242998,7 @@ async def index_revive_get( @validate_call - async def index_revive_get_with_http_info( + async def index_renesas_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243035,10 +243036,10 @@ async def index_revive_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination]: - """Return vulnerability data stored in index \"revive\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination]: + """Return vulnerability data stored in index \"renesas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` :param page: set the page number of the response :type page: int @@ -243110,7 +243111,7 @@ async def index_revive_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_revive_get_serialize( + _param = self._index_renesas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243142,7 +243143,7 @@ async def index_revive_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", '404': "str", '500': "str", } @@ -243158,7 +243159,7 @@ async def index_revive_get_with_http_info( @validate_call - async def index_revive_get_without_preload_content( + async def index_renesas_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243197,9 +243198,9 @@ async def index_revive_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"revive\" + """Return vulnerability data stored in index \"renesas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` :param page: set the page number of the response :type page: int @@ -243271,7 +243272,7 @@ async def index_revive_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_revive_get_serialize( + _param = self._index_renesas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243303,7 +243304,7 @@ async def index_revive_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", '404': "str", '500': "str", } @@ -243314,7 +243315,7 @@ async def index_revive_get_without_preload_content( return response_data.response - def _index_revive_get_serialize( + def _index_renesas_get_serialize( self, page, limit, @@ -243482,7 +243483,7 @@ def _index_revive_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/revive', + resource_path='/v3/index/renesas', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -243499,7 +243500,7 @@ def _index_revive_get_serialize( @validate_call - async def index_roche_get( + async def index_revive_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243537,10 +243538,10 @@ async def index_roche_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination: - """Return vulnerability data stored in index \"roche\" + ) -> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination: + """Return vulnerability data stored in index \"revive\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` :param page: set the page number of the response :type page: int @@ -243612,7 +243613,7 @@ async def index_roche_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_roche_get_serialize( + _param = self._index_revive_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243644,7 +243645,7 @@ async def index_roche_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", '404': "str", '500': "str", } @@ -243660,7 +243661,7 @@ async def index_roche_get( @validate_call - async def index_roche_get_with_http_info( + async def index_revive_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243698,10 +243699,10 @@ async def index_roche_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination]: - """Return vulnerability data stored in index \"roche\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination]: + """Return vulnerability data stored in index \"revive\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` :param page: set the page number of the response :type page: int @@ -243773,7 +243774,7 @@ async def index_roche_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_roche_get_serialize( + _param = self._index_revive_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243805,7 +243806,7 @@ async def index_roche_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", '404': "str", '500': "str", } @@ -243821,7 +243822,7 @@ async def index_roche_get_with_http_info( @validate_call - async def index_roche_get_without_preload_content( + async def index_revive_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243860,9 +243861,9 @@ async def index_roche_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"roche\" + """Return vulnerability data stored in index \"revive\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` :param page: set the page number of the response :type page: int @@ -243934,7 +243935,7 @@ async def index_roche_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_roche_get_serialize( + _param = self._index_revive_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243966,7 +243967,7 @@ async def index_roche_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", '404': "str", '500': "str", } @@ -243977,7 +243978,7 @@ async def index_roche_get_without_preload_content( return response_data.response - def _index_roche_get_serialize( + def _index_revive_get_serialize( self, page, limit, @@ -244145,7 +244146,7 @@ def _index_roche_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/roche', + resource_path='/v3/index/revive', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -244162,7 +244163,7 @@ def _index_roche_get_serialize( @validate_call - async def index_rockwell_get( + async def index_roche_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244200,10 +244201,10 @@ async def index_rockwell_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination: - """Return vulnerability data stored in index \"rockwell\" + ) -> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination: + """Return vulnerability data stored in index \"roche\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` :param page: set the page number of the response :type page: int @@ -244275,7 +244276,7 @@ async def index_rockwell_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rockwell_get_serialize( + _param = self._index_roche_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244307,7 +244308,7 @@ async def index_rockwell_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", '404': "str", '500': "str", } @@ -244323,7 +244324,7 @@ async def index_rockwell_get( @validate_call - async def index_rockwell_get_with_http_info( + async def index_roche_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244361,10 +244362,10 @@ async def index_rockwell_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination]: - """Return vulnerability data stored in index \"rockwell\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination]: + """Return vulnerability data stored in index \"roche\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` :param page: set the page number of the response :type page: int @@ -244436,7 +244437,7 @@ async def index_rockwell_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rockwell_get_serialize( + _param = self._index_roche_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244468,7 +244469,7 @@ async def index_rockwell_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", '404': "str", '500': "str", } @@ -244484,7 +244485,7 @@ async def index_rockwell_get_with_http_info( @validate_call - async def index_rockwell_get_without_preload_content( + async def index_roche_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244523,9 +244524,9 @@ async def index_rockwell_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rockwell\" + """Return vulnerability data stored in index \"roche\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` :param page: set the page number of the response :type page: int @@ -244597,7 +244598,7 @@ async def index_rockwell_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rockwell_get_serialize( + _param = self._index_roche_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244629,7 +244630,7 @@ async def index_rockwell_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", '404': "str", '500': "str", } @@ -244640,7 +244641,7 @@ async def index_rockwell_get_without_preload_content( return response_data.response - def _index_rockwell_get_serialize( + def _index_roche_get_serialize( self, page, limit, @@ -244808,7 +244809,7 @@ def _index_rockwell_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rockwell', + resource_path='/v3/index/roche', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -244825,7 +244826,7 @@ def _index_rockwell_get_serialize( @validate_call - async def index_rocky_errata_get( + async def index_rockwell_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244863,10 +244864,10 @@ async def index_rocky_errata_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination: - """Return vulnerability data stored in index \"rocky-errata\" + ) -> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination: + """Return vulnerability data stored in index \"rockwell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` :param page: set the page number of the response :type page: int @@ -244938,7 +244939,7 @@ async def index_rocky_errata_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_errata_get_serialize( + _param = self._index_rockwell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244970,7 +244971,7 @@ async def index_rocky_errata_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", '404': "str", '500': "str", } @@ -244986,7 +244987,7 @@ async def index_rocky_errata_get( @validate_call - async def index_rocky_errata_get_with_http_info( + async def index_rockwell_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245024,10 +245025,10 @@ async def index_rocky_errata_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination]: - """Return vulnerability data stored in index \"rocky-errata\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination]: + """Return vulnerability data stored in index \"rockwell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` :param page: set the page number of the response :type page: int @@ -245099,7 +245100,7 @@ async def index_rocky_errata_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_errata_get_serialize( + _param = self._index_rockwell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245131,7 +245132,7 @@ async def index_rocky_errata_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", '404': "str", '500': "str", } @@ -245147,7 +245148,7 @@ async def index_rocky_errata_get_with_http_info( @validate_call - async def index_rocky_errata_get_without_preload_content( + async def index_rockwell_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245186,9 +245187,9 @@ async def index_rocky_errata_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rocky-errata\" + """Return vulnerability data stored in index \"rockwell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` :param page: set the page number of the response :type page: int @@ -245260,7 +245261,7 @@ async def index_rocky_errata_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_errata_get_serialize( + _param = self._index_rockwell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245292,7 +245293,7 @@ async def index_rocky_errata_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", '404': "str", '500': "str", } @@ -245303,7 +245304,7 @@ async def index_rocky_errata_get_without_preload_content( return response_data.response - def _index_rocky_errata_get_serialize( + def _index_rockwell_get_serialize( self, page, limit, @@ -245471,7 +245472,7 @@ def _index_rocky_errata_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rocky-errata', + resource_path='/v3/index/rockwell', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -245488,7 +245489,7 @@ def _index_rocky_errata_get_serialize( @validate_call - async def index_rocky_get( + async def index_rocky_errata_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245526,10 +245527,10 @@ async def index_rocky_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiUpdatePaginatePagination: - """Return vulnerability data stored in index \"rocky\" + ) -> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination: + """Return vulnerability data stored in index \"rocky-errata\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` :param page: set the page number of the response :type page: int @@ -245601,7 +245602,7 @@ async def index_rocky_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_get_serialize( + _param = self._index_rocky_errata_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245633,7 +245634,7 @@ async def index_rocky_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", '404': "str", '500': "str", } @@ -245649,7 +245650,7 @@ async def index_rocky_get( @validate_call - async def index_rocky_get_with_http_info( + async def index_rocky_errata_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245687,10 +245688,10 @@ async def index_rocky_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiUpdatePaginatePagination]: - """Return vulnerability data stored in index \"rocky\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination]: + """Return vulnerability data stored in index \"rocky-errata\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` :param page: set the page number of the response :type page: int @@ -245762,7 +245763,7 @@ async def index_rocky_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_get_serialize( + _param = self._index_rocky_errata_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245794,7 +245795,7 @@ async def index_rocky_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", '404': "str", '500': "str", } @@ -245810,7 +245811,7 @@ async def index_rocky_get_with_http_info( @validate_call - async def index_rocky_get_without_preload_content( + async def index_rocky_errata_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245849,9 +245850,9 @@ async def index_rocky_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rocky\" + """Return vulnerability data stored in index \"rocky-errata\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` :param page: set the page number of the response :type page: int @@ -245923,7 +245924,7 @@ async def index_rocky_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_get_serialize( + _param = self._index_rocky_errata_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245955,7 +245956,7 @@ async def index_rocky_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", '404': "str", '500': "str", } @@ -245966,7 +245967,7 @@ async def index_rocky_get_without_preload_content( return response_data.response - def _index_rocky_get_serialize( + def _index_rocky_errata_get_serialize( self, page, limit, @@ -246134,7 +246135,7 @@ def _index_rocky_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rocky', + resource_path='/v3/index/rocky-errata', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -246151,7 +246152,7 @@ def _index_rocky_get_serialize( @validate_call - async def index_rocky_purls_get( + async def index_rocky_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246189,10 +246190,10 @@ async def index_rocky_purls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: - """Return vulnerability data stored in index \"rocky-purls\" + ) -> RenderResponseWithMetadataArrayApiUpdatePaginatePagination: + """Return vulnerability data stored in index \"rocky\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` :param page: set the page number of the response :type page: int @@ -246264,7 +246265,7 @@ async def index_rocky_purls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_purls_get_serialize( + _param = self._index_rocky_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246296,7 +246297,7 @@ async def index_rocky_purls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", '404': "str", '500': "str", } @@ -246312,7 +246313,7 @@ async def index_rocky_purls_get( @validate_call - async def index_rocky_purls_get_with_http_info( + async def index_rocky_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246350,10 +246351,10 @@ async def index_rocky_purls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: - """Return vulnerability data stored in index \"rocky-purls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiUpdatePaginatePagination]: + """Return vulnerability data stored in index \"rocky\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` :param page: set the page number of the response :type page: int @@ -246425,7 +246426,7 @@ async def index_rocky_purls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_purls_get_serialize( + _param = self._index_rocky_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246457,7 +246458,7 @@ async def index_rocky_purls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", '404': "str", '500': "str", } @@ -246473,7 +246474,7 @@ async def index_rocky_purls_get_with_http_info( @validate_call - async def index_rocky_purls_get_without_preload_content( + async def index_rocky_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246512,9 +246513,9 @@ async def index_rocky_purls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rocky-purls\" + """Return vulnerability data stored in index \"rocky\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` :param page: set the page number of the response :type page: int @@ -246586,7 +246587,7 @@ async def index_rocky_purls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_purls_get_serialize( + _param = self._index_rocky_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246618,7 +246619,7 @@ async def index_rocky_purls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", '404': "str", '500': "str", } @@ -246629,7 +246630,7 @@ async def index_rocky_purls_get_without_preload_content( return response_data.response - def _index_rocky_purls_get_serialize( + def _index_rocky_get_serialize( self, page, limit, @@ -246797,7 +246798,7 @@ def _index_rocky_purls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rocky-purls', + resource_path='/v3/index/rocky', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -246814,7 +246815,7 @@ def _index_rocky_purls_get_serialize( @validate_call - async def index_rsync_get( + async def index_rocky_purls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246852,10 +246853,10 @@ async def index_rsync_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination: - """Return vulnerability data stored in index \"rsync\" + ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: + """Return vulnerability data stored in index \"rocky-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` :param page: set the page number of the response :type page: int @@ -246927,7 +246928,7 @@ async def index_rsync_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rsync_get_serialize( + _param = self._index_rocky_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246959,7 +246960,7 @@ async def index_rsync_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -246975,7 +246976,7 @@ async def index_rsync_get( @validate_call - async def index_rsync_get_with_http_info( + async def index_rocky_purls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247013,10 +247014,10 @@ async def index_rsync_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination]: - """Return vulnerability data stored in index \"rsync\" + ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: + """Return vulnerability data stored in index \"rocky-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` :param page: set the page number of the response :type page: int @@ -247088,7 +247089,7 @@ async def index_rsync_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rsync_get_serialize( + _param = self._index_rocky_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247120,7 +247121,7 @@ async def index_rsync_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -247136,7 +247137,7 @@ async def index_rsync_get_with_http_info( @validate_call - async def index_rsync_get_without_preload_content( + async def index_rocky_purls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247175,9 +247176,9 @@ async def index_rsync_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rsync\" + """Return vulnerability data stored in index \"rocky-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` :param page: set the page number of the response :type page: int @@ -247249,7 +247250,7 @@ async def index_rsync_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rsync_get_serialize( + _param = self._index_rocky_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247281,7 +247282,7 @@ async def index_rsync_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -247292,7 +247293,7 @@ async def index_rsync_get_without_preload_content( return response_data.response - def _index_rsync_get_serialize( + def _index_rocky_purls_get_serialize( self, page, limit, @@ -247460,7 +247461,7 @@ def _index_rsync_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rsync', + resource_path='/v3/index/rocky-purls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -247477,7 +247478,7 @@ def _index_rsync_get_serialize( @validate_call - async def index_ruckus_get( + async def index_rsync_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247515,10 +247516,10 @@ async def index_ruckus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination: - """Return vulnerability data stored in index \"ruckus\" + ) -> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination: + """Return vulnerability data stored in index \"rsync\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` :param page: set the page number of the response :type page: int @@ -247590,7 +247591,7 @@ async def index_ruckus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ruckus_get_serialize( + _param = self._index_rsync_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247622,7 +247623,7 @@ async def index_ruckus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", '404': "str", '500': "str", } @@ -247638,7 +247639,7 @@ async def index_ruckus_get( @validate_call - async def index_ruckus_get_with_http_info( + async def index_rsync_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247676,10 +247677,10 @@ async def index_ruckus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination]: - """Return vulnerability data stored in index \"ruckus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination]: + """Return vulnerability data stored in index \"rsync\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` :param page: set the page number of the response :type page: int @@ -247751,7 +247752,7 @@ async def index_ruckus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ruckus_get_serialize( + _param = self._index_rsync_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247783,7 +247784,7 @@ async def index_ruckus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", '404': "str", '500': "str", } @@ -247799,7 +247800,7 @@ async def index_ruckus_get_with_http_info( @validate_call - async def index_ruckus_get_without_preload_content( + async def index_rsync_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247838,9 +247839,9 @@ async def index_ruckus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ruckus\" + """Return vulnerability data stored in index \"rsync\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` :param page: set the page number of the response :type page: int @@ -247912,7 +247913,7 @@ async def index_ruckus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ruckus_get_serialize( + _param = self._index_rsync_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247944,7 +247945,7 @@ async def index_ruckus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", '404': "str", '500': "str", } @@ -247955,7 +247956,7 @@ async def index_ruckus_get_without_preload_content( return response_data.response - def _index_ruckus_get_serialize( + def _index_rsync_get_serialize( self, page, limit, @@ -248123,7 +248124,7 @@ def _index_ruckus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ruckus', + resource_path='/v3/index/rsync', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -248140,7 +248141,7 @@ def _index_ruckus_get_serialize( @validate_call - async def index_rustsec_advisories_get( + async def index_ruckus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248178,10 +248179,10 @@ async def index_rustsec_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"rustsec-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination: + """Return vulnerability data stored in index \"ruckus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` :param page: set the page number of the response :type page: int @@ -248253,7 +248254,7 @@ async def index_rustsec_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rustsec_advisories_get_serialize( + _param = self._index_ruckus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248285,7 +248286,7 @@ async def index_rustsec_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", '404': "str", '500': "str", } @@ -248301,7 +248302,7 @@ async def index_rustsec_advisories_get( @validate_call - async def index_rustsec_advisories_get_with_http_info( + async def index_ruckus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248339,10 +248340,10 @@ async def index_rustsec_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"rustsec-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination]: + """Return vulnerability data stored in index \"ruckus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` :param page: set the page number of the response :type page: int @@ -248414,7 +248415,7 @@ async def index_rustsec_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rustsec_advisories_get_serialize( + _param = self._index_ruckus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248446,7 +248447,7 @@ async def index_rustsec_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", '404': "str", '500': "str", } @@ -248462,7 +248463,7 @@ async def index_rustsec_advisories_get_with_http_info( @validate_call - async def index_rustsec_advisories_get_without_preload_content( + async def index_ruckus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248501,9 +248502,9 @@ async def index_rustsec_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rustsec-advisories\" + """Return vulnerability data stored in index \"ruckus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` :param page: set the page number of the response :type page: int @@ -248575,7 +248576,7 @@ async def index_rustsec_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rustsec_advisories_get_serialize( + _param = self._index_ruckus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248607,7 +248608,7 @@ async def index_rustsec_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", '404': "str", '500': "str", } @@ -248618,7 +248619,7 @@ async def index_rustsec_advisories_get_without_preload_content( return response_data.response - def _index_rustsec_advisories_get_serialize( + def _index_ruckus_get_serialize( self, page, limit, @@ -248786,7 +248787,7 @@ def _index_rustsec_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rustsec-advisories', + resource_path='/v3/index/ruckus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -248803,7 +248804,7 @@ def _index_rustsec_advisories_get_serialize( @validate_call - async def index_sacert_get( + async def index_rustsec_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248841,10 +248842,10 @@ async def index_sacert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"sacert\" + ) -> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"rustsec-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -248916,7 +248917,7 @@ async def index_sacert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sacert_get_serialize( + _param = self._index_rustsec_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248948,7 +248949,7 @@ async def index_sacert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -248964,7 +248965,7 @@ async def index_sacert_get( @validate_call - async def index_sacert_get_with_http_info( + async def index_rustsec_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249002,10 +249003,10 @@ async def index_sacert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"sacert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"rustsec-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -249077,7 +249078,7 @@ async def index_sacert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sacert_get_serialize( + _param = self._index_rustsec_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249109,7 +249110,7 @@ async def index_sacert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -249125,7 +249126,7 @@ async def index_sacert_get_with_http_info( @validate_call - async def index_sacert_get_without_preload_content( + async def index_rustsec_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249164,9 +249165,9 @@ async def index_sacert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sacert\" + """Return vulnerability data stored in index \"rustsec-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -249238,7 +249239,7 @@ async def index_sacert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sacert_get_serialize( + _param = self._index_rustsec_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249270,7 +249271,7 @@ async def index_sacert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -249281,7 +249282,7 @@ async def index_sacert_get_without_preload_content( return response_data.response - def _index_sacert_get_serialize( + def _index_rustsec_advisories_get_serialize( self, page, limit, @@ -249449,7 +249450,7 @@ def _index_sacert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sacert', + resource_path='/v3/index/rustsec-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -249466,7 +249467,7 @@ def _index_sacert_get_serialize( @validate_call - async def index_safran_get( + async def index_sacert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249504,10 +249505,10 @@ async def index_safran_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination: - """Return vulnerability data stored in index \"safran\" + ) -> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"sacert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` :param page: set the page number of the response :type page: int @@ -249579,7 +249580,7 @@ async def index_safran_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_safran_get_serialize( + _param = self._index_sacert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249611,7 +249612,7 @@ async def index_safran_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -249627,7 +249628,7 @@ async def index_safran_get( @validate_call - async def index_safran_get_with_http_info( + async def index_sacert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249665,10 +249666,10 @@ async def index_safran_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination]: - """Return vulnerability data stored in index \"safran\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"sacert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` :param page: set the page number of the response :type page: int @@ -249740,7 +249741,7 @@ async def index_safran_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_safran_get_serialize( + _param = self._index_sacert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249772,7 +249773,7 @@ async def index_safran_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -249788,7 +249789,7 @@ async def index_safran_get_with_http_info( @validate_call - async def index_safran_get_without_preload_content( + async def index_sacert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249827,9 +249828,9 @@ async def index_safran_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"safran\" + """Return vulnerability data stored in index \"sacert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` :param page: set the page number of the response :type page: int @@ -249901,7 +249902,7 @@ async def index_safran_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_safran_get_serialize( + _param = self._index_sacert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249933,7 +249934,7 @@ async def index_safran_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -249944,7 +249945,7 @@ async def index_safran_get_without_preload_content( return response_data.response - def _index_safran_get_serialize( + def _index_sacert_get_serialize( self, page, limit, @@ -250112,7 +250113,7 @@ def _index_safran_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/safran', + resource_path='/v3/index/sacert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -250129,7 +250130,7 @@ def _index_safran_get_serialize( @validate_call - async def index_saint_get( + async def index_safran_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250167,10 +250168,10 @@ async def index_saint_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination: - """Return vulnerability data stored in index \"saint\" + ) -> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination: + """Return vulnerability data stored in index \"safran\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` :param page: set the page number of the response :type page: int @@ -250242,7 +250243,7 @@ async def index_saint_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_saint_get_serialize( + _param = self._index_safran_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250274,7 +250275,7 @@ async def index_saint_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", '404': "str", '500': "str", } @@ -250290,7 +250291,7 @@ async def index_saint_get( @validate_call - async def index_saint_get_with_http_info( + async def index_safran_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250328,10 +250329,10 @@ async def index_saint_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination]: - """Return vulnerability data stored in index \"saint\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination]: + """Return vulnerability data stored in index \"safran\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` :param page: set the page number of the response :type page: int @@ -250403,7 +250404,7 @@ async def index_saint_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_saint_get_serialize( + _param = self._index_safran_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250435,7 +250436,7 @@ async def index_saint_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", '404': "str", '500': "str", } @@ -250451,7 +250452,7 @@ async def index_saint_get_with_http_info( @validate_call - async def index_saint_get_without_preload_content( + async def index_safran_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250490,9 +250491,9 @@ async def index_saint_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"saint\" + """Return vulnerability data stored in index \"safran\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` :param page: set the page number of the response :type page: int @@ -250564,7 +250565,7 @@ async def index_saint_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_saint_get_serialize( + _param = self._index_safran_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250596,7 +250597,7 @@ async def index_saint_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", '404': "str", '500': "str", } @@ -250607,7 +250608,7 @@ async def index_saint_get_without_preload_content( return response_data.response - def _index_saint_get_serialize( + def _index_safran_get_serialize( self, page, limit, @@ -250775,7 +250776,7 @@ def _index_saint_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/saint', + resource_path='/v3/index/safran', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -250792,7 +250793,7 @@ def _index_saint_get_serialize( @validate_call - async def index_salesforce_get( + async def index_saint_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250830,10 +250831,10 @@ async def index_salesforce_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination: - """Return vulnerability data stored in index \"salesforce\" + ) -> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination: + """Return vulnerability data stored in index \"saint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` :param page: set the page number of the response :type page: int @@ -250905,7 +250906,7 @@ async def index_salesforce_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_salesforce_get_serialize( + _param = self._index_saint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250937,7 +250938,7 @@ async def index_salesforce_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", '404': "str", '500': "str", } @@ -250953,7 +250954,7 @@ async def index_salesforce_get( @validate_call - async def index_salesforce_get_with_http_info( + async def index_saint_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250991,10 +250992,10 @@ async def index_salesforce_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination]: - """Return vulnerability data stored in index \"salesforce\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination]: + """Return vulnerability data stored in index \"saint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` :param page: set the page number of the response :type page: int @@ -251066,7 +251067,7 @@ async def index_salesforce_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_salesforce_get_serialize( + _param = self._index_saint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251098,7 +251099,7 @@ async def index_salesforce_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", '404': "str", '500': "str", } @@ -251114,7 +251115,7 @@ async def index_salesforce_get_with_http_info( @validate_call - async def index_salesforce_get_without_preload_content( + async def index_saint_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251153,9 +251154,9 @@ async def index_salesforce_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"salesforce\" + """Return vulnerability data stored in index \"saint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` :param page: set the page number of the response :type page: int @@ -251227,7 +251228,7 @@ async def index_salesforce_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_salesforce_get_serialize( + _param = self._index_saint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251259,7 +251260,7 @@ async def index_salesforce_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", '404': "str", '500': "str", } @@ -251270,7 +251271,7 @@ async def index_salesforce_get_without_preload_content( return response_data.response - def _index_salesforce_get_serialize( + def _index_saint_get_serialize( self, page, limit, @@ -251438,7 +251439,7 @@ def _index_salesforce_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/salesforce', + resource_path='/v3/index/saint', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -251455,7 +251456,7 @@ def _index_salesforce_get_serialize( @validate_call - async def index_samba_get( + async def index_salesforce_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251493,10 +251494,10 @@ async def index_samba_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination: - """Return vulnerability data stored in index \"samba\" + ) -> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination: + """Return vulnerability data stored in index \"salesforce\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` :param page: set the page number of the response :type page: int @@ -251568,7 +251569,7 @@ async def index_samba_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_samba_get_serialize( + _param = self._index_salesforce_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251600,7 +251601,7 @@ async def index_samba_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", '404': "str", '500': "str", } @@ -251616,7 +251617,7 @@ async def index_samba_get( @validate_call - async def index_samba_get_with_http_info( + async def index_salesforce_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251654,10 +251655,10 @@ async def index_samba_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination]: - """Return vulnerability data stored in index \"samba\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination]: + """Return vulnerability data stored in index \"salesforce\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` :param page: set the page number of the response :type page: int @@ -251729,7 +251730,7 @@ async def index_samba_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_samba_get_serialize( + _param = self._index_salesforce_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251761,7 +251762,7 @@ async def index_samba_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", '404': "str", '500': "str", } @@ -251777,7 +251778,7 @@ async def index_samba_get_with_http_info( @validate_call - async def index_samba_get_without_preload_content( + async def index_salesforce_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251816,9 +251817,9 @@ async def index_samba_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"samba\" + """Return vulnerability data stored in index \"salesforce\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` :param page: set the page number of the response :type page: int @@ -251890,7 +251891,7 @@ async def index_samba_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_samba_get_serialize( + _param = self._index_salesforce_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251922,7 +251923,7 @@ async def index_samba_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", '404': "str", '500': "str", } @@ -251933,7 +251934,7 @@ async def index_samba_get_without_preload_content( return response_data.response - def _index_samba_get_serialize( + def _index_salesforce_get_serialize( self, page, limit, @@ -252101,7 +252102,7 @@ def _index_samba_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/samba', + resource_path='/v3/index/salesforce', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -252118,7 +252119,7 @@ def _index_samba_get_serialize( @validate_call - async def index_sandisk_get( + async def index_samba_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252156,10 +252157,10 @@ async def index_sandisk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination: - """Return vulnerability data stored in index \"sandisk\" + ) -> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination: + """Return vulnerability data stored in index \"samba\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` :param page: set the page number of the response :type page: int @@ -252231,7 +252232,7 @@ async def index_sandisk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sandisk_get_serialize( + _param = self._index_samba_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252263,7 +252264,7 @@ async def index_sandisk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", '404': "str", '500': "str", } @@ -252279,7 +252280,7 @@ async def index_sandisk_get( @validate_call - async def index_sandisk_get_with_http_info( + async def index_samba_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252317,10 +252318,10 @@ async def index_sandisk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination]: - """Return vulnerability data stored in index \"sandisk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination]: + """Return vulnerability data stored in index \"samba\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` :param page: set the page number of the response :type page: int @@ -252392,7 +252393,7 @@ async def index_sandisk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sandisk_get_serialize( + _param = self._index_samba_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252424,7 +252425,7 @@ async def index_sandisk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", '404': "str", '500': "str", } @@ -252440,7 +252441,7 @@ async def index_sandisk_get_with_http_info( @validate_call - async def index_sandisk_get_without_preload_content( + async def index_samba_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252479,9 +252480,9 @@ async def index_sandisk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sandisk\" + """Return vulnerability data stored in index \"samba\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` :param page: set the page number of the response :type page: int @@ -252553,7 +252554,7 @@ async def index_sandisk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sandisk_get_serialize( + _param = self._index_samba_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252585,7 +252586,7 @@ async def index_sandisk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", '404': "str", '500': "str", } @@ -252596,7 +252597,7 @@ async def index_sandisk_get_without_preload_content( return response_data.response - def _index_sandisk_get_serialize( + def _index_samba_get_serialize( self, page, limit, @@ -252764,7 +252765,7 @@ def _index_sandisk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sandisk', + resource_path='/v3/index/samba', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -252781,7 +252782,7 @@ def _index_sandisk_get_serialize( @validate_call - async def index_sans_dshield_get( + async def index_sandisk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252819,10 +252820,10 @@ async def index_sans_dshield_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination: - """Return vulnerability data stored in index \"sans-dshield\" + ) -> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination: + """Return vulnerability data stored in index \"sandisk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` :param page: set the page number of the response :type page: int @@ -252894,7 +252895,7 @@ async def index_sans_dshield_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sans_dshield_get_serialize( + _param = self._index_sandisk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252926,7 +252927,7 @@ async def index_sans_dshield_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", '404': "str", '500': "str", } @@ -252942,7 +252943,7 @@ async def index_sans_dshield_get( @validate_call - async def index_sans_dshield_get_with_http_info( + async def index_sandisk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252980,10 +252981,10 @@ async def index_sans_dshield_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination]: - """Return vulnerability data stored in index \"sans-dshield\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination]: + """Return vulnerability data stored in index \"sandisk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` :param page: set the page number of the response :type page: int @@ -253055,7 +253056,7 @@ async def index_sans_dshield_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sans_dshield_get_serialize( + _param = self._index_sandisk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253087,7 +253088,7 @@ async def index_sans_dshield_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", '404': "str", '500': "str", } @@ -253103,7 +253104,7 @@ async def index_sans_dshield_get_with_http_info( @validate_call - async def index_sans_dshield_get_without_preload_content( + async def index_sandisk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253142,9 +253143,9 @@ async def index_sans_dshield_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sans-dshield\" + """Return vulnerability data stored in index \"sandisk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` :param page: set the page number of the response :type page: int @@ -253216,7 +253217,7 @@ async def index_sans_dshield_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sans_dshield_get_serialize( + _param = self._index_sandisk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253248,7 +253249,7 @@ async def index_sans_dshield_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", '404': "str", '500': "str", } @@ -253259,7 +253260,7 @@ async def index_sans_dshield_get_without_preload_content( return response_data.response - def _index_sans_dshield_get_serialize( + def _index_sandisk_get_serialize( self, page, limit, @@ -253427,7 +253428,7 @@ def _index_sans_dshield_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sans-dshield', + resource_path='/v3/index/sandisk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -253444,7 +253445,7 @@ def _index_sans_dshield_get_serialize( @validate_call - async def index_sap_get( + async def index_sans_dshield_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253482,10 +253483,10 @@ async def index_sap_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination: - """Return vulnerability data stored in index \"sap\" + ) -> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination: + """Return vulnerability data stored in index \"sans-dshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` :param page: set the page number of the response :type page: int @@ -253557,7 +253558,7 @@ async def index_sap_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sap_get_serialize( + _param = self._index_sans_dshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253589,7 +253590,7 @@ async def index_sap_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", '404': "str", '500': "str", } @@ -253605,7 +253606,7 @@ async def index_sap_get( @validate_call - async def index_sap_get_with_http_info( + async def index_sans_dshield_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253643,10 +253644,10 @@ async def index_sap_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination]: - """Return vulnerability data stored in index \"sap\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination]: + """Return vulnerability data stored in index \"sans-dshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` :param page: set the page number of the response :type page: int @@ -253718,7 +253719,7 @@ async def index_sap_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sap_get_serialize( + _param = self._index_sans_dshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253750,7 +253751,7 @@ async def index_sap_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", '404': "str", '500': "str", } @@ -253766,7 +253767,7 @@ async def index_sap_get_with_http_info( @validate_call - async def index_sap_get_without_preload_content( + async def index_sans_dshield_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253805,9 +253806,9 @@ async def index_sap_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sap\" + """Return vulnerability data stored in index \"sans-dshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` :param page: set the page number of the response :type page: int @@ -253879,7 +253880,7 @@ async def index_sap_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sap_get_serialize( + _param = self._index_sans_dshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253911,7 +253912,7 @@ async def index_sap_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", '404': "str", '500': "str", } @@ -253922,7 +253923,7 @@ async def index_sap_get_without_preload_content( return response_data.response - def _index_sap_get_serialize( + def _index_sans_dshield_get_serialize( self, page, limit, @@ -254090,7 +254091,7 @@ def _index_sap_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sap', + resource_path='/v3/index/sans-dshield', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -254107,7 +254108,7 @@ def _index_sap_get_serialize( @validate_call - async def index_schneider_electric_get( + async def index_sap_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254145,10 +254146,10 @@ async def index_schneider_electric_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"schneider-electric\" + ) -> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination: + """Return vulnerability data stored in index \"sap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` :param page: set the page number of the response :type page: int @@ -254220,7 +254221,7 @@ async def index_schneider_electric_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schneider_electric_get_serialize( + _param = self._index_sap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254252,7 +254253,7 @@ async def index_schneider_electric_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", '404': "str", '500': "str", } @@ -254268,7 +254269,7 @@ async def index_schneider_electric_get( @validate_call - async def index_schneider_electric_get_with_http_info( + async def index_sap_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254306,10 +254307,10 @@ async def index_schneider_electric_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"schneider-electric\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination]: + """Return vulnerability data stored in index \"sap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` :param page: set the page number of the response :type page: int @@ -254381,7 +254382,7 @@ async def index_schneider_electric_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schneider_electric_get_serialize( + _param = self._index_sap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254413,7 +254414,7 @@ async def index_schneider_electric_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", '404': "str", '500': "str", } @@ -254429,7 +254430,7 @@ async def index_schneider_electric_get_with_http_info( @validate_call - async def index_schneider_electric_get_without_preload_content( + async def index_sap_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254468,9 +254469,9 @@ async def index_schneider_electric_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"schneider-electric\" + """Return vulnerability data stored in index \"sap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` :param page: set the page number of the response :type page: int @@ -254542,7 +254543,7 @@ async def index_schneider_electric_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schneider_electric_get_serialize( + _param = self._index_sap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254574,7 +254575,7 @@ async def index_schneider_electric_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", '404': "str", '500': "str", } @@ -254585,7 +254586,7 @@ async def index_schneider_electric_get_without_preload_content( return response_data.response - def _index_schneider_electric_get_serialize( + def _index_sap_get_serialize( self, page, limit, @@ -254753,7 +254754,7 @@ def _index_schneider_electric_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/schneider-electric', + resource_path='/v3/index/sap', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -254770,7 +254771,7 @@ def _index_schneider_electric_get_serialize( @validate_call - async def index_schutzwerk_get( + async def index_schneider_electric_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254808,10 +254809,10 @@ async def index_schutzwerk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination: - """Return vulnerability data stored in index \"schutzwerk\" + ) -> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"schneider-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` :param page: set the page number of the response :type page: int @@ -254883,7 +254884,7 @@ async def index_schutzwerk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schutzwerk_get_serialize( + _param = self._index_schneider_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254915,7 +254916,7 @@ async def index_schutzwerk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -254931,7 +254932,7 @@ async def index_schutzwerk_get( @validate_call - async def index_schutzwerk_get_with_http_info( + async def index_schneider_electric_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254969,10 +254970,10 @@ async def index_schutzwerk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination]: - """Return vulnerability data stored in index \"schutzwerk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"schneider-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` :param page: set the page number of the response :type page: int @@ -255044,7 +255045,7 @@ async def index_schutzwerk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schutzwerk_get_serialize( + _param = self._index_schneider_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255076,7 +255077,7 @@ async def index_schutzwerk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -255092,7 +255093,7 @@ async def index_schutzwerk_get_with_http_info( @validate_call - async def index_schutzwerk_get_without_preload_content( + async def index_schneider_electric_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255131,9 +255132,9 @@ async def index_schutzwerk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"schutzwerk\" + """Return vulnerability data stored in index \"schneider-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` :param page: set the page number of the response :type page: int @@ -255205,7 +255206,7 @@ async def index_schutzwerk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schutzwerk_get_serialize( + _param = self._index_schneider_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255237,7 +255238,7 @@ async def index_schutzwerk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -255248,7 +255249,7 @@ async def index_schutzwerk_get_without_preload_content( return response_data.response - def _index_schutzwerk_get_serialize( + def _index_schneider_electric_get_serialize( self, page, limit, @@ -255416,7 +255417,7 @@ def _index_schutzwerk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/schutzwerk', + resource_path='/v3/index/schneider-electric', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -255433,7 +255434,7 @@ def _index_schutzwerk_get_serialize( @validate_call - async def index_sec_consult_get( + async def index_schutzwerk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255471,10 +255472,10 @@ async def index_sec_consult_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination: - """Return vulnerability data stored in index \"sec-consult\" + ) -> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination: + """Return vulnerability data stored in index \"schutzwerk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` :param page: set the page number of the response :type page: int @@ -255546,7 +255547,7 @@ async def index_sec_consult_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sec_consult_get_serialize( + _param = self._index_schutzwerk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255578,7 +255579,7 @@ async def index_sec_consult_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", '404': "str", '500': "str", } @@ -255594,7 +255595,7 @@ async def index_sec_consult_get( @validate_call - async def index_sec_consult_get_with_http_info( + async def index_schutzwerk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255632,10 +255633,10 @@ async def index_sec_consult_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination]: - """Return vulnerability data stored in index \"sec-consult\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination]: + """Return vulnerability data stored in index \"schutzwerk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` :param page: set the page number of the response :type page: int @@ -255707,7 +255708,7 @@ async def index_sec_consult_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sec_consult_get_serialize( + _param = self._index_schutzwerk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255739,7 +255740,7 @@ async def index_sec_consult_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", '404': "str", '500': "str", } @@ -255755,7 +255756,7 @@ async def index_sec_consult_get_with_http_info( @validate_call - async def index_sec_consult_get_without_preload_content( + async def index_schutzwerk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255794,9 +255795,9 @@ async def index_sec_consult_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sec-consult\" + """Return vulnerability data stored in index \"schutzwerk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` :param page: set the page number of the response :type page: int @@ -255868,7 +255869,7 @@ async def index_sec_consult_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sec_consult_get_serialize( + _param = self._index_schutzwerk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255900,7 +255901,7 @@ async def index_sec_consult_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", '404': "str", '500': "str", } @@ -255911,7 +255912,7 @@ async def index_sec_consult_get_without_preload_content( return response_data.response - def _index_sec_consult_get_serialize( + def _index_schutzwerk_get_serialize( self, page, limit, @@ -256079,7 +256080,7 @@ def _index_sec_consult_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sec-consult', + resource_path='/v3/index/schutzwerk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -256096,7 +256097,7 @@ def _index_sec_consult_get_serialize( @validate_call - async def index_securitylab_get( + async def index_sec_consult_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256134,10 +256135,10 @@ async def index_securitylab_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination: - """Return vulnerability data stored in index \"securitylab\" + ) -> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination: + """Return vulnerability data stored in index \"sec-consult\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` :param page: set the page number of the response :type page: int @@ -256209,7 +256210,7 @@ async def index_securitylab_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_securitylab_get_serialize( + _param = self._index_sec_consult_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256241,7 +256242,7 @@ async def index_securitylab_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", '404': "str", '500': "str", } @@ -256257,7 +256258,7 @@ async def index_securitylab_get( @validate_call - async def index_securitylab_get_with_http_info( + async def index_sec_consult_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256295,10 +256296,10 @@ async def index_securitylab_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination]: - """Return vulnerability data stored in index \"securitylab\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination]: + """Return vulnerability data stored in index \"sec-consult\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` :param page: set the page number of the response :type page: int @@ -256370,7 +256371,7 @@ async def index_securitylab_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_securitylab_get_serialize( + _param = self._index_sec_consult_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256402,7 +256403,7 @@ async def index_securitylab_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", '404': "str", '500': "str", } @@ -256418,7 +256419,7 @@ async def index_securitylab_get_with_http_info( @validate_call - async def index_securitylab_get_without_preload_content( + async def index_sec_consult_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256457,9 +256458,9 @@ async def index_securitylab_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"securitylab\" + """Return vulnerability data stored in index \"sec-consult\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` :param page: set the page number of the response :type page: int @@ -256531,7 +256532,7 @@ async def index_securitylab_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_securitylab_get_serialize( + _param = self._index_sec_consult_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256563,7 +256564,7 @@ async def index_securitylab_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", '404': "str", '500': "str", } @@ -256574,7 +256575,7 @@ async def index_securitylab_get_without_preload_content( return response_data.response - def _index_securitylab_get_serialize( + def _index_sec_consult_get_serialize( self, page, limit, @@ -256742,7 +256743,7 @@ def _index_securitylab_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/securitylab', + resource_path='/v3/index/sec-consult', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -256759,7 +256760,7 @@ def _index_securitylab_get_serialize( @validate_call - async def index_seebug_get( + async def index_securitylab_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256797,10 +256798,10 @@ async def index_seebug_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination: - """Return vulnerability data stored in index \"seebug\" + ) -> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination: + """Return vulnerability data stored in index \"securitylab\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` :param page: set the page number of the response :type page: int @@ -256872,7 +256873,7 @@ async def index_seebug_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_seebug_get_serialize( + _param = self._index_securitylab_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256904,7 +256905,7 @@ async def index_seebug_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", '404': "str", '500': "str", } @@ -256920,7 +256921,7 @@ async def index_seebug_get( @validate_call - async def index_seebug_get_with_http_info( + async def index_securitylab_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256958,10 +256959,10 @@ async def index_seebug_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination]: - """Return vulnerability data stored in index \"seebug\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination]: + """Return vulnerability data stored in index \"securitylab\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` :param page: set the page number of the response :type page: int @@ -257033,7 +257034,7 @@ async def index_seebug_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_seebug_get_serialize( + _param = self._index_securitylab_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257065,7 +257066,7 @@ async def index_seebug_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", '404': "str", '500': "str", } @@ -257081,7 +257082,7 @@ async def index_seebug_get_with_http_info( @validate_call - async def index_seebug_get_without_preload_content( + async def index_securitylab_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257120,9 +257121,9 @@ async def index_seebug_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"seebug\" + """Return vulnerability data stored in index \"securitylab\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` :param page: set the page number of the response :type page: int @@ -257194,7 +257195,7 @@ async def index_seebug_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_seebug_get_serialize( + _param = self._index_securitylab_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257226,7 +257227,7 @@ async def index_seebug_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", '404': "str", '500': "str", } @@ -257237,7 +257238,7 @@ async def index_seebug_get_without_preload_content( return response_data.response - def _index_seebug_get_serialize( + def _index_securitylab_get_serialize( self, page, limit, @@ -257405,7 +257406,7 @@ def _index_seebug_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/seebug', + resource_path='/v3/index/securitylab', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -257422,7 +257423,7 @@ def _index_seebug_get_serialize( @validate_call - async def index_sel_get( + async def index_seebug_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257460,10 +257461,10 @@ async def index_sel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination: - """Return vulnerability data stored in index \"sel\" + ) -> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination: + """Return vulnerability data stored in index \"seebug\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` :param page: set the page number of the response :type page: int @@ -257535,7 +257536,7 @@ async def index_sel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sel_get_serialize( + _param = self._index_seebug_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257567,7 +257568,7 @@ async def index_sel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", '404': "str", '500': "str", } @@ -257583,7 +257584,7 @@ async def index_sel_get( @validate_call - async def index_sel_get_with_http_info( + async def index_seebug_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257621,10 +257622,10 @@ async def index_sel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySelPaginatePagination]: - """Return vulnerability data stored in index \"sel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination]: + """Return vulnerability data stored in index \"seebug\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` :param page: set the page number of the response :type page: int @@ -257696,7 +257697,7 @@ async def index_sel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sel_get_serialize( + _param = self._index_seebug_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257728,7 +257729,7 @@ async def index_sel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", '404': "str", '500': "str", } @@ -257744,7 +257745,7 @@ async def index_sel_get_with_http_info( @validate_call - async def index_sel_get_without_preload_content( + async def index_seebug_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257783,9 +257784,9 @@ async def index_sel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sel\" + """Return vulnerability data stored in index \"seebug\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` :param page: set the page number of the response :type page: int @@ -257857,7 +257858,7 @@ async def index_sel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sel_get_serialize( + _param = self._index_seebug_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257889,7 +257890,7 @@ async def index_sel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", '404': "str", '500': "str", } @@ -257900,7 +257901,7 @@ async def index_sel_get_without_preload_content( return response_data.response - def _index_sel_get_serialize( + def _index_seebug_get_serialize( self, page, limit, @@ -258068,7 +258069,7 @@ def _index_sel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sel', + resource_path='/v3/index/seebug', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -258085,7 +258086,7 @@ def _index_sel_get_serialize( @validate_call - async def index_sentinelone_get( + async def index_sel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258123,10 +258124,10 @@ async def index_sentinelone_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination: - """Return vulnerability data stored in index \"sentinelone\" + ) -> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination: + """Return vulnerability data stored in index \"sel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` :param page: set the page number of the response :type page: int @@ -258198,7 +258199,7 @@ async def index_sentinelone_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sentinelone_get_serialize( + _param = self._index_sel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258230,7 +258231,7 @@ async def index_sentinelone_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", '404': "str", '500': "str", } @@ -258246,7 +258247,7 @@ async def index_sentinelone_get( @validate_call - async def index_sentinelone_get_with_http_info( + async def index_sel_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258284,10 +258285,10 @@ async def index_sentinelone_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination]: - """Return vulnerability data stored in index \"sentinelone\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySelPaginatePagination]: + """Return vulnerability data stored in index \"sel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` :param page: set the page number of the response :type page: int @@ -258359,7 +258360,7 @@ async def index_sentinelone_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sentinelone_get_serialize( + _param = self._index_sel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258391,7 +258392,7 @@ async def index_sentinelone_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", '404': "str", '500': "str", } @@ -258407,7 +258408,7 @@ async def index_sentinelone_get_with_http_info( @validate_call - async def index_sentinelone_get_without_preload_content( + async def index_sel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258446,9 +258447,9 @@ async def index_sentinelone_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sentinelone\" + """Return vulnerability data stored in index \"sel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` :param page: set the page number of the response :type page: int @@ -258520,7 +258521,7 @@ async def index_sentinelone_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sentinelone_get_serialize( + _param = self._index_sel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258552,7 +258553,7 @@ async def index_sentinelone_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", '404': "str", '500': "str", } @@ -258563,7 +258564,7 @@ async def index_sentinelone_get_without_preload_content( return response_data.response - def _index_sentinelone_get_serialize( + def _index_sel_get_serialize( self, page, limit, @@ -258731,7 +258732,7 @@ def _index_sentinelone_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sentinelone', + resource_path='/v3/index/sel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -258748,7 +258749,7 @@ def _index_sentinelone_get_serialize( @validate_call - async def index_servicenow_get( + async def index_sentinelone_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258786,10 +258787,10 @@ async def index_servicenow_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination: - """Return vulnerability data stored in index \"servicenow\" + ) -> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination: + """Return vulnerability data stored in index \"sentinelone\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` :param page: set the page number of the response :type page: int @@ -258861,7 +258862,7 @@ async def index_servicenow_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_servicenow_get_serialize( + _param = self._index_sentinelone_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258893,7 +258894,7 @@ async def index_servicenow_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", '404': "str", '500': "str", } @@ -258909,7 +258910,7 @@ async def index_servicenow_get( @validate_call - async def index_servicenow_get_with_http_info( + async def index_sentinelone_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258947,10 +258948,10 @@ async def index_servicenow_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination]: - """Return vulnerability data stored in index \"servicenow\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination]: + """Return vulnerability data stored in index \"sentinelone\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` :param page: set the page number of the response :type page: int @@ -259022,7 +259023,7 @@ async def index_servicenow_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_servicenow_get_serialize( + _param = self._index_sentinelone_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259054,7 +259055,7 @@ async def index_servicenow_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", '404': "str", '500': "str", } @@ -259070,7 +259071,7 @@ async def index_servicenow_get_with_http_info( @validate_call - async def index_servicenow_get_without_preload_content( + async def index_sentinelone_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259109,9 +259110,9 @@ async def index_servicenow_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"servicenow\" + """Return vulnerability data stored in index \"sentinelone\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` :param page: set the page number of the response :type page: int @@ -259183,7 +259184,7 @@ async def index_servicenow_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_servicenow_get_serialize( + _param = self._index_sentinelone_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259215,7 +259216,7 @@ async def index_servicenow_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", '404': "str", '500': "str", } @@ -259226,7 +259227,7 @@ async def index_servicenow_get_without_preload_content( return response_data.response - def _index_servicenow_get_serialize( + def _index_sentinelone_get_serialize( self, page, limit, @@ -259394,7 +259395,7 @@ def _index_servicenow_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/servicenow', + resource_path='/v3/index/sentinelone', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -259411,7 +259412,7 @@ def _index_servicenow_get_serialize( @validate_call - async def index_shadowserver_exploited_get( + async def index_servicenow_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259449,10 +259450,10 @@ async def index_shadowserver_exploited_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination: - """Return vulnerability data stored in index \"shadowserver-exploited\" + ) -> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination: + """Return vulnerability data stored in index \"servicenow\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` :param page: set the page number of the response :type page: int @@ -259524,7 +259525,7 @@ async def index_shadowserver_exploited_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shadowserver_exploited_get_serialize( + _param = self._index_servicenow_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259556,7 +259557,7 @@ async def index_shadowserver_exploited_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", '404': "str", '500': "str", } @@ -259572,7 +259573,7 @@ async def index_shadowserver_exploited_get( @validate_call - async def index_shadowserver_exploited_get_with_http_info( + async def index_servicenow_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259610,10 +259611,10 @@ async def index_shadowserver_exploited_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination]: - """Return vulnerability data stored in index \"shadowserver-exploited\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination]: + """Return vulnerability data stored in index \"servicenow\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` :param page: set the page number of the response :type page: int @@ -259685,7 +259686,7 @@ async def index_shadowserver_exploited_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shadowserver_exploited_get_serialize( + _param = self._index_servicenow_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259717,7 +259718,7 @@ async def index_shadowserver_exploited_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", '404': "str", '500': "str", } @@ -259733,7 +259734,7 @@ async def index_shadowserver_exploited_get_with_http_info( @validate_call - async def index_shadowserver_exploited_get_without_preload_content( + async def index_servicenow_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259772,9 +259773,9 @@ async def index_shadowserver_exploited_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"shadowserver-exploited\" + """Return vulnerability data stored in index \"servicenow\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` :param page: set the page number of the response :type page: int @@ -259846,7 +259847,7 @@ async def index_shadowserver_exploited_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shadowserver_exploited_get_serialize( + _param = self._index_servicenow_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259878,7 +259879,7 @@ async def index_shadowserver_exploited_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", '404': "str", '500': "str", } @@ -259889,7 +259890,7 @@ async def index_shadowserver_exploited_get_without_preload_content( return response_data.response - def _index_shadowserver_exploited_get_serialize( + def _index_servicenow_get_serialize( self, page, limit, @@ -260057,7 +260058,7 @@ def _index_shadowserver_exploited_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/shadowserver-exploited', + resource_path='/v3/index/servicenow', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -260074,7 +260075,7 @@ def _index_shadowserver_exploited_get_serialize( @validate_call - async def index_shielder_get( + async def index_shadowserver_exploited_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260112,10 +260113,10 @@ async def index_shielder_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination: - """Return vulnerability data stored in index \"shielder\" + ) -> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination: + """Return vulnerability data stored in index \"shadowserver-exploited\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` :param page: set the page number of the response :type page: int @@ -260187,7 +260188,7 @@ async def index_shielder_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shielder_get_serialize( + _param = self._index_shadowserver_exploited_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260219,7 +260220,7 @@ async def index_shielder_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -260235,7 +260236,7 @@ async def index_shielder_get( @validate_call - async def index_shielder_get_with_http_info( + async def index_shadowserver_exploited_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260273,10 +260274,10 @@ async def index_shielder_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination]: - """Return vulnerability data stored in index \"shielder\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination]: + """Return vulnerability data stored in index \"shadowserver-exploited\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` :param page: set the page number of the response :type page: int @@ -260348,7 +260349,7 @@ async def index_shielder_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shielder_get_serialize( + _param = self._index_shadowserver_exploited_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260380,7 +260381,7 @@ async def index_shielder_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -260396,7 +260397,7 @@ async def index_shielder_get_with_http_info( @validate_call - async def index_shielder_get_without_preload_content( + async def index_shadowserver_exploited_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260435,9 +260436,9 @@ async def index_shielder_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"shielder\" + """Return vulnerability data stored in index \"shadowserver-exploited\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` :param page: set the page number of the response :type page: int @@ -260509,7 +260510,7 @@ async def index_shielder_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shielder_get_serialize( + _param = self._index_shadowserver_exploited_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260541,7 +260542,7 @@ async def index_shielder_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -260552,7 +260553,7 @@ async def index_shielder_get_without_preload_content( return response_data.response - def _index_shielder_get_serialize( + def _index_shadowserver_exploited_get_serialize( self, page, limit, @@ -260720,7 +260721,7 @@ def _index_shielder_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/shielder', + resource_path='/v3/index/shadowserver-exploited', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -260737,7 +260738,7 @@ def _index_shielder_get_serialize( @validate_call - async def index_sick_get( + async def index_shielder_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260775,10 +260776,10 @@ async def index_sick_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination: - """Return vulnerability data stored in index \"sick\" + ) -> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination: + """Return vulnerability data stored in index \"shielder\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` :param page: set the page number of the response :type page: int @@ -260850,7 +260851,7 @@ async def index_sick_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sick_get_serialize( + _param = self._index_shielder_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260882,7 +260883,7 @@ async def index_sick_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", '404': "str", '500': "str", } @@ -260898,7 +260899,7 @@ async def index_sick_get( @validate_call - async def index_sick_get_with_http_info( + async def index_shielder_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260936,10 +260937,10 @@ async def index_sick_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySickPaginatePagination]: - """Return vulnerability data stored in index \"sick\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination]: + """Return vulnerability data stored in index \"shielder\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` :param page: set the page number of the response :type page: int @@ -261011,7 +261012,7 @@ async def index_sick_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sick_get_serialize( + _param = self._index_shielder_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261043,7 +261044,7 @@ async def index_sick_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", '404': "str", '500': "str", } @@ -261059,7 +261060,7 @@ async def index_sick_get_with_http_info( @validate_call - async def index_sick_get_without_preload_content( + async def index_shielder_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261098,9 +261099,9 @@ async def index_sick_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sick\" + """Return vulnerability data stored in index \"shielder\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` :param page: set the page number of the response :type page: int @@ -261172,7 +261173,7 @@ async def index_sick_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sick_get_serialize( + _param = self._index_shielder_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261204,7 +261205,7 @@ async def index_sick_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", '404': "str", '500': "str", } @@ -261215,7 +261216,7 @@ async def index_sick_get_without_preload_content( return response_data.response - def _index_sick_get_serialize( + def _index_shielder_get_serialize( self, page, limit, @@ -261383,7 +261384,7 @@ def _index_sick_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sick', + resource_path='/v3/index/shielder', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -261400,7 +261401,7 @@ def _index_sick_get_serialize( @validate_call - async def index_siemens_get( + async def index_sick_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261438,10 +261439,10 @@ async def index_siemens_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"siemens\" + ) -> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination: + """Return vulnerability data stored in index \"sick\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` :param page: set the page number of the response :type page: int @@ -261513,7 +261514,7 @@ async def index_siemens_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_siemens_get_serialize( + _param = self._index_sick_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261545,7 +261546,7 @@ async def index_siemens_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", '404': "str", '500': "str", } @@ -261561,7 +261562,7 @@ async def index_siemens_get( @validate_call - async def index_siemens_get_with_http_info( + async def index_sick_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261599,10 +261600,10 @@ async def index_siemens_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"siemens\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySickPaginatePagination]: + """Return vulnerability data stored in index \"sick\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` :param page: set the page number of the response :type page: int @@ -261674,7 +261675,7 @@ async def index_siemens_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_siemens_get_serialize( + _param = self._index_sick_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261706,7 +261707,7 @@ async def index_siemens_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", '404': "str", '500': "str", } @@ -261722,7 +261723,7 @@ async def index_siemens_get_with_http_info( @validate_call - async def index_siemens_get_without_preload_content( + async def index_sick_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261761,9 +261762,9 @@ async def index_siemens_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"siemens\" + """Return vulnerability data stored in index \"sick\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` :param page: set the page number of the response :type page: int @@ -261835,7 +261836,7 @@ async def index_siemens_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_siemens_get_serialize( + _param = self._index_sick_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261867,7 +261868,7 @@ async def index_siemens_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", '404': "str", '500': "str", } @@ -261878,7 +261879,7 @@ async def index_siemens_get_without_preload_content( return response_data.response - def _index_siemens_get_serialize( + def _index_sick_get_serialize( self, page, limit, @@ -262046,7 +262047,7 @@ def _index_siemens_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/siemens', + resource_path='/v3/index/sick', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -262063,7 +262064,7 @@ def _index_siemens_get_serialize( @validate_call - async def index_sierra_wireless_get( + async def index_siemens_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262101,10 +262102,10 @@ async def index_sierra_wireless_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination: - """Return vulnerability data stored in index \"sierra-wireless\" + ) -> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"siemens\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` :param page: set the page number of the response :type page: int @@ -262176,7 +262177,7 @@ async def index_sierra_wireless_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sierra_wireless_get_serialize( + _param = self._index_siemens_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262208,7 +262209,7 @@ async def index_sierra_wireless_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -262224,7 +262225,7 @@ async def index_sierra_wireless_get( @validate_call - async def index_sierra_wireless_get_with_http_info( + async def index_siemens_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262262,10 +262263,10 @@ async def index_sierra_wireless_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination]: - """Return vulnerability data stored in index \"sierra-wireless\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"siemens\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` :param page: set the page number of the response :type page: int @@ -262337,7 +262338,7 @@ async def index_sierra_wireless_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sierra_wireless_get_serialize( + _param = self._index_siemens_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262369,7 +262370,7 @@ async def index_sierra_wireless_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -262385,7 +262386,7 @@ async def index_sierra_wireless_get_with_http_info( @validate_call - async def index_sierra_wireless_get_without_preload_content( + async def index_siemens_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262424,9 +262425,9 @@ async def index_sierra_wireless_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sierra-wireless\" + """Return vulnerability data stored in index \"siemens\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` :param page: set the page number of the response :type page: int @@ -262498,7 +262499,7 @@ async def index_sierra_wireless_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sierra_wireless_get_serialize( + _param = self._index_siemens_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262530,7 +262531,7 @@ async def index_sierra_wireless_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -262541,7 +262542,7 @@ async def index_sierra_wireless_get_without_preload_content( return response_data.response - def _index_sierra_wireless_get_serialize( + def _index_siemens_get_serialize( self, page, limit, @@ -262709,7 +262710,7 @@ def _index_sierra_wireless_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sierra-wireless', + resource_path='/v3/index/siemens', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -262726,7 +262727,7 @@ def _index_sierra_wireless_get_serialize( @validate_call - async def index_sigmahq_sigma_rules_get( + async def index_sierra_wireless_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262764,10 +262765,10 @@ async def index_sigmahq_sigma_rules_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination: - """Return vulnerability data stored in index \"sigmahq-sigma-rules\" + ) -> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination: + """Return vulnerability data stored in index \"sierra-wireless\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` :param page: set the page number of the response :type page: int @@ -262839,7 +262840,7 @@ async def index_sigmahq_sigma_rules_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sigmahq_sigma_rules_get_serialize( + _param = self._index_sierra_wireless_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262871,7 +262872,7 @@ async def index_sigmahq_sigma_rules_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", '404': "str", '500': "str", } @@ -262887,7 +262888,7 @@ async def index_sigmahq_sigma_rules_get( @validate_call - async def index_sigmahq_sigma_rules_get_with_http_info( + async def index_sierra_wireless_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262925,10 +262926,10 @@ async def index_sigmahq_sigma_rules_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination]: - """Return vulnerability data stored in index \"sigmahq-sigma-rules\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination]: + """Return vulnerability data stored in index \"sierra-wireless\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` :param page: set the page number of the response :type page: int @@ -263000,7 +263001,7 @@ async def index_sigmahq_sigma_rules_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sigmahq_sigma_rules_get_serialize( + _param = self._index_sierra_wireless_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263032,7 +263033,7 @@ async def index_sigmahq_sigma_rules_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", '404': "str", '500': "str", } @@ -263048,7 +263049,7 @@ async def index_sigmahq_sigma_rules_get_with_http_info( @validate_call - async def index_sigmahq_sigma_rules_get_without_preload_content( + async def index_sierra_wireless_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263087,9 +263088,9 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sigmahq-sigma-rules\" + """Return vulnerability data stored in index \"sierra-wireless\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` :param page: set the page number of the response :type page: int @@ -263161,7 +263162,7 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sigmahq_sigma_rules_get_serialize( + _param = self._index_sierra_wireless_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263193,7 +263194,7 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", '404': "str", '500': "str", } @@ -263204,7 +263205,7 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( return response_data.response - def _index_sigmahq_sigma_rules_get_serialize( + def _index_sierra_wireless_get_serialize( self, page, limit, @@ -263372,7 +263373,7 @@ def _index_sigmahq_sigma_rules_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sigmahq-sigma-rules', + resource_path='/v3/index/sierra-wireless', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -263389,7 +263390,7 @@ def _index_sigmahq_sigma_rules_get_serialize( @validate_call - async def index_singcert_get( + async def index_sigmahq_sigma_rules_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263427,10 +263428,10 @@ async def index_singcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination: - """Return vulnerability data stored in index \"singcert\" + ) -> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination: + """Return vulnerability data stored in index \"sigmahq-sigma-rules\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` :param page: set the page number of the response :type page: int @@ -263502,7 +263503,7 @@ async def index_singcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_singcert_get_serialize( + _param = self._index_sigmahq_sigma_rules_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263534,7 +263535,7 @@ async def index_singcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", '404': "str", '500': "str", } @@ -263550,7 +263551,7 @@ async def index_singcert_get( @validate_call - async def index_singcert_get_with_http_info( + async def index_sigmahq_sigma_rules_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263588,10 +263589,10 @@ async def index_singcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination]: - """Return vulnerability data stored in index \"singcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination]: + """Return vulnerability data stored in index \"sigmahq-sigma-rules\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` :param page: set the page number of the response :type page: int @@ -263663,7 +263664,7 @@ async def index_singcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_singcert_get_serialize( + _param = self._index_sigmahq_sigma_rules_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263695,7 +263696,7 @@ async def index_singcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", '404': "str", '500': "str", } @@ -263711,7 +263712,7 @@ async def index_singcert_get_with_http_info( @validate_call - async def index_singcert_get_without_preload_content( + async def index_sigmahq_sigma_rules_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263750,9 +263751,9 @@ async def index_singcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"singcert\" + """Return vulnerability data stored in index \"sigmahq-sigma-rules\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` :param page: set the page number of the response :type page: int @@ -263824,7 +263825,7 @@ async def index_singcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_singcert_get_serialize( + _param = self._index_sigmahq_sigma_rules_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263856,7 +263857,7 @@ async def index_singcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", '404': "str", '500': "str", } @@ -263867,7 +263868,7 @@ async def index_singcert_get_without_preload_content( return response_data.response - def _index_singcert_get_serialize( + def _index_sigmahq_sigma_rules_get_serialize( self, page, limit, @@ -264035,7 +264036,7 @@ def _index_singcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/singcert', + resource_path='/v3/index/sigmahq-sigma-rules', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -264052,7 +264053,7 @@ def _index_singcert_get_serialize( @validate_call - async def index_sitecore_get( + async def index_singcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264090,10 +264091,10 @@ async def index_sitecore_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination: - """Return vulnerability data stored in index \"sitecore\" + ) -> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination: + """Return vulnerability data stored in index \"singcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` :param page: set the page number of the response :type page: int @@ -264165,7 +264166,7 @@ async def index_sitecore_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sitecore_get_serialize( + _param = self._index_singcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264197,7 +264198,7 @@ async def index_sitecore_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", '404': "str", '500': "str", } @@ -264213,7 +264214,7 @@ async def index_sitecore_get( @validate_call - async def index_sitecore_get_with_http_info( + async def index_singcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264251,10 +264252,10 @@ async def index_sitecore_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination]: - """Return vulnerability data stored in index \"sitecore\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination]: + """Return vulnerability data stored in index \"singcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` :param page: set the page number of the response :type page: int @@ -264326,7 +264327,7 @@ async def index_sitecore_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sitecore_get_serialize( + _param = self._index_singcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264358,7 +264359,7 @@ async def index_sitecore_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", '404': "str", '500': "str", } @@ -264374,7 +264375,7 @@ async def index_sitecore_get_with_http_info( @validate_call - async def index_sitecore_get_without_preload_content( + async def index_singcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264413,9 +264414,9 @@ async def index_sitecore_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sitecore\" + """Return vulnerability data stored in index \"singcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` :param page: set the page number of the response :type page: int @@ -264487,7 +264488,7 @@ async def index_sitecore_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sitecore_get_serialize( + _param = self._index_singcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264519,7 +264520,7 @@ async def index_sitecore_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", '404': "str", '500': "str", } @@ -264530,7 +264531,7 @@ async def index_sitecore_get_without_preload_content( return response_data.response - def _index_sitecore_get_serialize( + def _index_singcert_get_serialize( self, page, limit, @@ -264698,7 +264699,7 @@ def _index_sitecore_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sitecore', + resource_path='/v3/index/singcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -264715,7 +264716,7 @@ def _index_sitecore_get_serialize( @validate_call - async def index_slackware_get( + async def index_sitecore_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264753,10 +264754,10 @@ async def index_slackware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination: - """Return vulnerability data stored in index \"slackware\" + ) -> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination: + """Return vulnerability data stored in index \"sitecore\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` :param page: set the page number of the response :type page: int @@ -264828,7 +264829,7 @@ async def index_slackware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_slackware_get_serialize( + _param = self._index_sitecore_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264860,7 +264861,7 @@ async def index_slackware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", '404': "str", '500': "str", } @@ -264876,7 +264877,7 @@ async def index_slackware_get( @validate_call - async def index_slackware_get_with_http_info( + async def index_sitecore_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264914,10 +264915,10 @@ async def index_slackware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination]: - """Return vulnerability data stored in index \"slackware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination]: + """Return vulnerability data stored in index \"sitecore\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` :param page: set the page number of the response :type page: int @@ -264989,7 +264990,7 @@ async def index_slackware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_slackware_get_serialize( + _param = self._index_sitecore_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265021,7 +265022,7 @@ async def index_slackware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", '404': "str", '500': "str", } @@ -265037,7 +265038,7 @@ async def index_slackware_get_with_http_info( @validate_call - async def index_slackware_get_without_preload_content( + async def index_sitecore_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265076,9 +265077,9 @@ async def index_slackware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"slackware\" + """Return vulnerability data stored in index \"sitecore\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` :param page: set the page number of the response :type page: int @@ -265150,7 +265151,7 @@ async def index_slackware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_slackware_get_serialize( + _param = self._index_sitecore_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265182,7 +265183,7 @@ async def index_slackware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", '404': "str", '500': "str", } @@ -265193,7 +265194,7 @@ async def index_slackware_get_without_preload_content( return response_data.response - def _index_slackware_get_serialize( + def _index_sitecore_get_serialize( self, page, limit, @@ -265361,7 +265362,7 @@ def _index_slackware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/slackware', + resource_path='/v3/index/sitecore', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -265378,7 +265379,7 @@ def _index_slackware_get_serialize( @validate_call - async def index_solarwinds_get( + async def index_slackware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265416,10 +265417,10 @@ async def index_solarwinds_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"solarwinds\" + ) -> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination: + """Return vulnerability data stored in index \"slackware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` :param page: set the page number of the response :type page: int @@ -265491,7 +265492,7 @@ async def index_solarwinds_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solarwinds_get_serialize( + _param = self._index_slackware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265523,7 +265524,7 @@ async def index_solarwinds_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", '404': "str", '500': "str", } @@ -265539,7 +265540,7 @@ async def index_solarwinds_get( @validate_call - async def index_solarwinds_get_with_http_info( + async def index_slackware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265577,10 +265578,10 @@ async def index_solarwinds_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"solarwinds\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination]: + """Return vulnerability data stored in index \"slackware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` :param page: set the page number of the response :type page: int @@ -265652,7 +265653,7 @@ async def index_solarwinds_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solarwinds_get_serialize( + _param = self._index_slackware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265684,7 +265685,7 @@ async def index_solarwinds_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", '404': "str", '500': "str", } @@ -265700,7 +265701,7 @@ async def index_solarwinds_get_with_http_info( @validate_call - async def index_solarwinds_get_without_preload_content( + async def index_slackware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265739,9 +265740,9 @@ async def index_solarwinds_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"solarwinds\" + """Return vulnerability data stored in index \"slackware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` :param page: set the page number of the response :type page: int @@ -265813,7 +265814,7 @@ async def index_solarwinds_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solarwinds_get_serialize( + _param = self._index_slackware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265845,7 +265846,7 @@ async def index_solarwinds_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", '404': "str", '500': "str", } @@ -265856,7 +265857,7 @@ async def index_solarwinds_get_without_preload_content( return response_data.response - def _index_solarwinds_get_serialize( + def _index_slackware_get_serialize( self, page, limit, @@ -266024,7 +266025,7 @@ def _index_solarwinds_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/solarwinds', + resource_path='/v3/index/slackware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -266041,7 +266042,7 @@ def _index_solarwinds_get_serialize( @validate_call - async def index_solr_get( + async def index_solarwinds_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266079,10 +266080,10 @@ async def index_solr_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination: - """Return vulnerability data stored in index \"solr\" + ) -> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"solarwinds\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` :param page: set the page number of the response :type page: int @@ -266154,7 +266155,7 @@ async def index_solr_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solr_get_serialize( + _param = self._index_solarwinds_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266186,7 +266187,7 @@ async def index_solr_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -266202,7 +266203,7 @@ async def index_solr_get( @validate_call - async def index_solr_get_with_http_info( + async def index_solarwinds_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266240,10 +266241,10 @@ async def index_solr_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination]: - """Return vulnerability data stored in index \"solr\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"solarwinds\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` :param page: set the page number of the response :type page: int @@ -266315,7 +266316,7 @@ async def index_solr_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solr_get_serialize( + _param = self._index_solarwinds_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266347,7 +266348,7 @@ async def index_solr_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -266363,7 +266364,7 @@ async def index_solr_get_with_http_info( @validate_call - async def index_solr_get_without_preload_content( + async def index_solarwinds_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266402,9 +266403,9 @@ async def index_solr_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"solr\" + """Return vulnerability data stored in index \"solarwinds\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` :param page: set the page number of the response :type page: int @@ -266476,7 +266477,7 @@ async def index_solr_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solr_get_serialize( + _param = self._index_solarwinds_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266508,7 +266509,7 @@ async def index_solr_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -266519,7 +266520,7 @@ async def index_solr_get_without_preload_content( return response_data.response - def _index_solr_get_serialize( + def _index_solarwinds_get_serialize( self, page, limit, @@ -266687,7 +266688,7 @@ def _index_solr_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/solr', + resource_path='/v3/index/solarwinds', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -266704,7 +266705,7 @@ def _index_solr_get_serialize( @validate_call - async def index_sonatype_get( + async def index_solr_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266742,10 +266743,10 @@ async def index_sonatype_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination: - """Return vulnerability data stored in index \"sonatype\" + ) -> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination: + """Return vulnerability data stored in index \"solr\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` :param page: set the page number of the response :type page: int @@ -266817,7 +266818,7 @@ async def index_sonatype_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonatype_get_serialize( + _param = self._index_solr_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266849,7 +266850,7 @@ async def index_sonatype_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", '404': "str", '500': "str", } @@ -266865,7 +266866,7 @@ async def index_sonatype_get( @validate_call - async def index_sonatype_get_with_http_info( + async def index_solr_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266903,10 +266904,10 @@ async def index_sonatype_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination]: - """Return vulnerability data stored in index \"sonatype\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination]: + """Return vulnerability data stored in index \"solr\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` :param page: set the page number of the response :type page: int @@ -266978,7 +266979,7 @@ async def index_sonatype_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonatype_get_serialize( + _param = self._index_solr_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267010,7 +267011,7 @@ async def index_sonatype_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", '404': "str", '500': "str", } @@ -267026,7 +267027,7 @@ async def index_sonatype_get_with_http_info( @validate_call - async def index_sonatype_get_without_preload_content( + async def index_solr_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267065,9 +267066,9 @@ async def index_sonatype_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sonatype\" + """Return vulnerability data stored in index \"solr\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` :param page: set the page number of the response :type page: int @@ -267139,7 +267140,7 @@ async def index_sonatype_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonatype_get_serialize( + _param = self._index_solr_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267171,7 +267172,7 @@ async def index_sonatype_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", '404': "str", '500': "str", } @@ -267182,7 +267183,7 @@ async def index_sonatype_get_without_preload_content( return response_data.response - def _index_sonatype_get_serialize( + def _index_solr_get_serialize( self, page, limit, @@ -267350,7 +267351,7 @@ def _index_sonatype_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sonatype', + resource_path='/v3/index/solr', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -267367,7 +267368,7 @@ def _index_sonatype_get_serialize( @validate_call - async def index_sonicwall_get( + async def index_sonatype_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267405,10 +267406,10 @@ async def index_sonicwall_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"sonicwall\" + ) -> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination: + """Return vulnerability data stored in index \"sonatype\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` :param page: set the page number of the response :type page: int @@ -267480,7 +267481,7 @@ async def index_sonicwall_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonicwall_get_serialize( + _param = self._index_sonatype_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267512,7 +267513,7 @@ async def index_sonicwall_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", '404': "str", '500': "str", } @@ -267528,7 +267529,7 @@ async def index_sonicwall_get( @validate_call - async def index_sonicwall_get_with_http_info( + async def index_sonatype_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267566,10 +267567,10 @@ async def index_sonicwall_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"sonicwall\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination]: + """Return vulnerability data stored in index \"sonatype\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` :param page: set the page number of the response :type page: int @@ -267641,7 +267642,7 @@ async def index_sonicwall_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonicwall_get_serialize( + _param = self._index_sonatype_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267673,7 +267674,7 @@ async def index_sonicwall_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", '404': "str", '500': "str", } @@ -267689,7 +267690,7 @@ async def index_sonicwall_get_with_http_info( @validate_call - async def index_sonicwall_get_without_preload_content( + async def index_sonatype_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267728,9 +267729,9 @@ async def index_sonicwall_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sonicwall\" + """Return vulnerability data stored in index \"sonatype\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` :param page: set the page number of the response :type page: int @@ -267802,7 +267803,7 @@ async def index_sonicwall_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonicwall_get_serialize( + _param = self._index_sonatype_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267834,7 +267835,7 @@ async def index_sonicwall_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", '404': "str", '500': "str", } @@ -267845,7 +267846,7 @@ async def index_sonicwall_get_without_preload_content( return response_data.response - def _index_sonicwall_get_serialize( + def _index_sonatype_get_serialize( self, page, limit, @@ -268013,7 +268014,7 @@ def _index_sonicwall_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sonicwall', + resource_path='/v3/index/sonatype', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -268030,7 +268031,7 @@ def _index_sonicwall_get_serialize( @validate_call - async def index_spacelabs_healthcare_get( + async def index_sonicwall_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268068,10 +268069,10 @@ async def index_spacelabs_healthcare_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"spacelabs-healthcare\" + ) -> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"sonicwall\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` :param page: set the page number of the response :type page: int @@ -268143,7 +268144,7 @@ async def index_spacelabs_healthcare_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spacelabs_healthcare_get_serialize( + _param = self._index_sonicwall_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268175,7 +268176,7 @@ async def index_spacelabs_healthcare_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -268191,7 +268192,7 @@ async def index_spacelabs_healthcare_get( @validate_call - async def index_spacelabs_healthcare_get_with_http_info( + async def index_sonicwall_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268229,10 +268230,10 @@ async def index_spacelabs_healthcare_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"spacelabs-healthcare\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"sonicwall\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` :param page: set the page number of the response :type page: int @@ -268304,7 +268305,7 @@ async def index_spacelabs_healthcare_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spacelabs_healthcare_get_serialize( + _param = self._index_sonicwall_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268336,7 +268337,7 @@ async def index_spacelabs_healthcare_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -268352,7 +268353,7 @@ async def index_spacelabs_healthcare_get_with_http_info( @validate_call - async def index_spacelabs_healthcare_get_without_preload_content( + async def index_sonicwall_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268391,9 +268392,9 @@ async def index_spacelabs_healthcare_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"spacelabs-healthcare\" + """Return vulnerability data stored in index \"sonicwall\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` :param page: set the page number of the response :type page: int @@ -268465,7 +268466,7 @@ async def index_spacelabs_healthcare_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spacelabs_healthcare_get_serialize( + _param = self._index_sonicwall_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268497,7 +268498,7 @@ async def index_spacelabs_healthcare_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -268508,7 +268509,7 @@ async def index_spacelabs_healthcare_get_without_preload_content( return response_data.response - def _index_spacelabs_healthcare_get_serialize( + def _index_sonicwall_get_serialize( self, page, limit, @@ -268676,7 +268677,7 @@ def _index_spacelabs_healthcare_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/spacelabs-healthcare', + resource_path='/v3/index/sonicwall', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -268693,7 +268694,7 @@ def _index_spacelabs_healthcare_get_serialize( @validate_call - async def index_splunk_get( + async def index_spacelabs_healthcare_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268731,10 +268732,10 @@ async def index_splunk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination: - """Return vulnerability data stored in index \"splunk\" + ) -> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"spacelabs-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -268806,7 +268807,7 @@ async def index_splunk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_splunk_get_serialize( + _param = self._index_spacelabs_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268838,7 +268839,7 @@ async def index_splunk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -268854,7 +268855,7 @@ async def index_splunk_get( @validate_call - async def index_splunk_get_with_http_info( + async def index_spacelabs_healthcare_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268892,10 +268893,10 @@ async def index_splunk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination]: - """Return vulnerability data stored in index \"splunk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"spacelabs-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -268967,7 +268968,7 @@ async def index_splunk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_splunk_get_serialize( + _param = self._index_spacelabs_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268999,7 +269000,7 @@ async def index_splunk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -269015,7 +269016,7 @@ async def index_splunk_get_with_http_info( @validate_call - async def index_splunk_get_without_preload_content( + async def index_spacelabs_healthcare_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269054,9 +269055,9 @@ async def index_splunk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"splunk\" + """Return vulnerability data stored in index \"spacelabs-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -269128,7 +269129,7 @@ async def index_splunk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_splunk_get_serialize( + _param = self._index_spacelabs_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269160,7 +269161,7 @@ async def index_splunk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -269171,7 +269172,7 @@ async def index_splunk_get_without_preload_content( return response_data.response - def _index_splunk_get_serialize( + def _index_spacelabs_healthcare_get_serialize( self, page, limit, @@ -269339,7 +269340,7 @@ def _index_splunk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/splunk', + resource_path='/v3/index/spacelabs-healthcare', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -269356,7 +269357,7 @@ def _index_splunk_get_serialize( @validate_call - async def index_spring_get( + async def index_splunk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269394,10 +269395,10 @@ async def index_spring_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination: - """Return vulnerability data stored in index \"spring\" + ) -> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination: + """Return vulnerability data stored in index \"splunk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` :param page: set the page number of the response :type page: int @@ -269469,7 +269470,7 @@ async def index_spring_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spring_get_serialize( + _param = self._index_splunk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269501,7 +269502,7 @@ async def index_spring_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", '404': "str", '500': "str", } @@ -269517,7 +269518,7 @@ async def index_spring_get( @validate_call - async def index_spring_get_with_http_info( + async def index_splunk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269555,10 +269556,10 @@ async def index_spring_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination]: - """Return vulnerability data stored in index \"spring\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination]: + """Return vulnerability data stored in index \"splunk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` :param page: set the page number of the response :type page: int @@ -269630,7 +269631,7 @@ async def index_spring_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spring_get_serialize( + _param = self._index_splunk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269662,7 +269663,7 @@ async def index_spring_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", '404': "str", '500': "str", } @@ -269678,7 +269679,7 @@ async def index_spring_get_with_http_info( @validate_call - async def index_spring_get_without_preload_content( + async def index_splunk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269717,9 +269718,9 @@ async def index_spring_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"spring\" + """Return vulnerability data stored in index \"splunk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` :param page: set the page number of the response :type page: int @@ -269791,7 +269792,7 @@ async def index_spring_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spring_get_serialize( + _param = self._index_splunk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269823,7 +269824,7 @@ async def index_spring_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", '404': "str", '500': "str", } @@ -269834,7 +269835,7 @@ async def index_spring_get_without_preload_content( return response_data.response - def _index_spring_get_serialize( + def _index_splunk_get_serialize( self, page, limit, @@ -270002,7 +270003,7 @@ def _index_spring_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/spring', + resource_path='/v3/index/splunk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -270019,7 +270020,7 @@ def _index_spring_get_serialize( @validate_call - async def index_ssd_get( + async def index_spring_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270057,10 +270058,10 @@ async def index_ssd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"ssd\" + ) -> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination: + """Return vulnerability data stored in index \"spring\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` :param page: set the page number of the response :type page: int @@ -270132,7 +270133,7 @@ async def index_ssd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ssd_get_serialize( + _param = self._index_spring_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270164,7 +270165,7 @@ async def index_ssd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", '404': "str", '500': "str", } @@ -270180,7 +270181,7 @@ async def index_ssd_get( @validate_call - async def index_ssd_get_with_http_info( + async def index_spring_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270218,10 +270219,10 @@ async def index_ssd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"ssd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination]: + """Return vulnerability data stored in index \"spring\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` :param page: set the page number of the response :type page: int @@ -270293,7 +270294,7 @@ async def index_ssd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ssd_get_serialize( + _param = self._index_spring_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270325,7 +270326,7 @@ async def index_ssd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", '404': "str", '500': "str", } @@ -270341,7 +270342,7 @@ async def index_ssd_get_with_http_info( @validate_call - async def index_ssd_get_without_preload_content( + async def index_spring_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270380,9 +270381,9 @@ async def index_ssd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ssd\" + """Return vulnerability data stored in index \"spring\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` :param page: set the page number of the response :type page: int @@ -270454,7 +270455,7 @@ async def index_ssd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ssd_get_serialize( + _param = self._index_spring_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270486,7 +270487,7 @@ async def index_ssd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", '404': "str", '500': "str", } @@ -270497,7 +270498,7 @@ async def index_ssd_get_without_preload_content( return response_data.response - def _index_ssd_get_serialize( + def _index_spring_get_serialize( self, page, limit, @@ -270665,7 +270666,7 @@ def _index_ssd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ssd', + resource_path='/v3/index/spring', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -270682,7 +270683,7 @@ def _index_ssd_get_serialize( @validate_call - async def index_stormshield_get( + async def index_ssd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270720,10 +270721,10 @@ async def index_stormshield_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination: - """Return vulnerability data stored in index \"stormshield\" + ) -> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"ssd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` :param page: set the page number of the response :type page: int @@ -270795,7 +270796,7 @@ async def index_stormshield_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stormshield_get_serialize( + _param = self._index_ssd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270827,7 +270828,7 @@ async def index_stormshield_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -270843,7 +270844,7 @@ async def index_stormshield_get( @validate_call - async def index_stormshield_get_with_http_info( + async def index_ssd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270881,10 +270882,10 @@ async def index_stormshield_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination]: - """Return vulnerability data stored in index \"stormshield\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"ssd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` :param page: set the page number of the response :type page: int @@ -270956,7 +270957,7 @@ async def index_stormshield_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stormshield_get_serialize( + _param = self._index_ssd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270988,7 +270989,7 @@ async def index_stormshield_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -271004,7 +271005,7 @@ async def index_stormshield_get_with_http_info( @validate_call - async def index_stormshield_get_without_preload_content( + async def index_ssd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271043,9 +271044,9 @@ async def index_stormshield_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"stormshield\" + """Return vulnerability data stored in index \"ssd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` :param page: set the page number of the response :type page: int @@ -271117,7 +271118,7 @@ async def index_stormshield_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stormshield_get_serialize( + _param = self._index_ssd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271149,7 +271150,7 @@ async def index_stormshield_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -271160,7 +271161,7 @@ async def index_stormshield_get_without_preload_content( return response_data.response - def _index_stormshield_get_serialize( + def _index_ssd_get_serialize( self, page, limit, @@ -271328,7 +271329,7 @@ def _index_stormshield_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/stormshield', + resource_path='/v3/index/ssd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -271345,7 +271346,7 @@ def _index_stormshield_get_serialize( @validate_call - async def index_stryker_get( + async def index_stormshield_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271383,10 +271384,10 @@ async def index_stryker_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"stryker\" + ) -> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination: + """Return vulnerability data stored in index \"stormshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` :param page: set the page number of the response :type page: int @@ -271458,7 +271459,7 @@ async def index_stryker_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stryker_get_serialize( + _param = self._index_stormshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271490,7 +271491,7 @@ async def index_stryker_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", '404': "str", '500': "str", } @@ -271506,7 +271507,7 @@ async def index_stryker_get( @validate_call - async def index_stryker_get_with_http_info( + async def index_stormshield_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271544,10 +271545,10 @@ async def index_stryker_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"stryker\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination]: + """Return vulnerability data stored in index \"stormshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` :param page: set the page number of the response :type page: int @@ -271619,7 +271620,7 @@ async def index_stryker_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stryker_get_serialize( + _param = self._index_stormshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271651,7 +271652,7 @@ async def index_stryker_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", '404': "str", '500': "str", } @@ -271667,7 +271668,7 @@ async def index_stryker_get_with_http_info( @validate_call - async def index_stryker_get_without_preload_content( + async def index_stormshield_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271706,9 +271707,9 @@ async def index_stryker_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"stryker\" + """Return vulnerability data stored in index \"stormshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` :param page: set the page number of the response :type page: int @@ -271780,7 +271781,7 @@ async def index_stryker_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stryker_get_serialize( + _param = self._index_stormshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271812,7 +271813,7 @@ async def index_stryker_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", '404': "str", '500': "str", } @@ -271823,7 +271824,7 @@ async def index_stryker_get_without_preload_content( return response_data.response - def _index_stryker_get_serialize( + def _index_stormshield_get_serialize( self, page, limit, @@ -271991,7 +271992,7 @@ def _index_stryker_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/stryker', + resource_path='/v3/index/stormshield', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -272008,7 +272009,7 @@ def _index_stryker_get_serialize( @validate_call - async def index_sudo_get( + async def index_stryker_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272046,10 +272047,10 @@ async def index_sudo_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination: - """Return vulnerability data stored in index \"sudo\" + ) -> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"stryker\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` :param page: set the page number of the response :type page: int @@ -272121,7 +272122,7 @@ async def index_sudo_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sudo_get_serialize( + _param = self._index_stryker_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272153,7 +272154,7 @@ async def index_sudo_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -272169,7 +272170,7 @@ async def index_sudo_get( @validate_call - async def index_sudo_get_with_http_info( + async def index_stryker_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272207,10 +272208,10 @@ async def index_sudo_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination]: - """Return vulnerability data stored in index \"sudo\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"stryker\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` :param page: set the page number of the response :type page: int @@ -272282,7 +272283,7 @@ async def index_sudo_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sudo_get_serialize( + _param = self._index_stryker_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272314,7 +272315,7 @@ async def index_sudo_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -272330,7 +272331,7 @@ async def index_sudo_get_with_http_info( @validate_call - async def index_sudo_get_without_preload_content( + async def index_stryker_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272369,9 +272370,9 @@ async def index_sudo_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sudo\" + """Return vulnerability data stored in index \"stryker\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` :param page: set the page number of the response :type page: int @@ -272443,7 +272444,7 @@ async def index_sudo_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sudo_get_serialize( + _param = self._index_stryker_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272475,7 +272476,7 @@ async def index_sudo_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -272486,7 +272487,7 @@ async def index_sudo_get_without_preload_content( return response_data.response - def _index_sudo_get_serialize( + def _index_stryker_get_serialize( self, page, limit, @@ -272654,7 +272655,7 @@ def _index_sudo_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sudo', + resource_path='/v3/index/stryker', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -272671,7 +272672,7 @@ def _index_sudo_get_serialize( @validate_call - async def index_suse_get( + async def index_sudo_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272709,10 +272710,10 @@ async def index_suse_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination: - """Return vulnerability data stored in index \"suse\" + ) -> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination: + """Return vulnerability data stored in index \"sudo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` :param page: set the page number of the response :type page: int @@ -272784,7 +272785,7 @@ async def index_suse_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_get_serialize( + _param = self._index_sudo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272816,7 +272817,7 @@ async def index_suse_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", '404': "str", '500': "str", } @@ -272832,7 +272833,7 @@ async def index_suse_get( @validate_call - async def index_suse_get_with_http_info( + async def index_sudo_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272870,10 +272871,10 @@ async def index_suse_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination]: - """Return vulnerability data stored in index \"suse\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination]: + """Return vulnerability data stored in index \"sudo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` :param page: set the page number of the response :type page: int @@ -272945,7 +272946,7 @@ async def index_suse_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_get_serialize( + _param = self._index_sudo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272977,7 +272978,7 @@ async def index_suse_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", '404': "str", '500': "str", } @@ -272993,7 +272994,7 @@ async def index_suse_get_with_http_info( @validate_call - async def index_suse_get_without_preload_content( + async def index_sudo_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273032,9 +273033,9 @@ async def index_suse_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"suse\" + """Return vulnerability data stored in index \"sudo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` :param page: set the page number of the response :type page: int @@ -273106,7 +273107,7 @@ async def index_suse_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_get_serialize( + _param = self._index_sudo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273138,7 +273139,7 @@ async def index_suse_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", '404': "str", '500': "str", } @@ -273149,7 +273150,7 @@ async def index_suse_get_without_preload_content( return response_data.response - def _index_suse_get_serialize( + def _index_sudo_get_serialize( self, page, limit, @@ -273317,7 +273318,7 @@ def _index_suse_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/suse', + resource_path='/v3/index/sudo', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -273334,7 +273335,7 @@ def _index_suse_get_serialize( @validate_call - async def index_suse_security_get( + async def index_suse_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273372,10 +273373,10 @@ async def index_suse_security_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination: - """Return vulnerability data stored in index \"suse-security\" + ) -> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination: + """Return vulnerability data stored in index \"suse\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` :param page: set the page number of the response :type page: int @@ -273447,7 +273448,7 @@ async def index_suse_security_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_security_get_serialize( + _param = self._index_suse_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273479,7 +273480,7 @@ async def index_suse_security_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", '404': "str", '500': "str", } @@ -273495,7 +273496,7 @@ async def index_suse_security_get( @validate_call - async def index_suse_security_get_with_http_info( + async def index_suse_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273533,10 +273534,10 @@ async def index_suse_security_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination]: - """Return vulnerability data stored in index \"suse-security\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination]: + """Return vulnerability data stored in index \"suse\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` :param page: set the page number of the response :type page: int @@ -273608,7 +273609,7 @@ async def index_suse_security_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_security_get_serialize( + _param = self._index_suse_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273640,7 +273641,7 @@ async def index_suse_security_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", '404': "str", '500': "str", } @@ -273656,7 +273657,7 @@ async def index_suse_security_get_with_http_info( @validate_call - async def index_suse_security_get_without_preload_content( + async def index_suse_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273695,9 +273696,9 @@ async def index_suse_security_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"suse-security\" + """Return vulnerability data stored in index \"suse\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` :param page: set the page number of the response :type page: int @@ -273769,7 +273770,7 @@ async def index_suse_security_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_security_get_serialize( + _param = self._index_suse_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273801,7 +273802,7 @@ async def index_suse_security_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", '404': "str", '500': "str", } @@ -273812,7 +273813,7 @@ async def index_suse_security_get_without_preload_content( return response_data.response - def _index_suse_security_get_serialize( + def _index_suse_get_serialize( self, page, limit, @@ -273980,7 +273981,7 @@ def _index_suse_security_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/suse-security', + resource_path='/v3/index/suse', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -273997,7 +273998,7 @@ def _index_suse_security_get_serialize( @validate_call - async def index_swift_get( + async def index_suse_security_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274035,10 +274036,10 @@ async def index_swift_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"swift\" + ) -> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination: + """Return vulnerability data stored in index \"suse-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` :param page: set the page number of the response :type page: int @@ -274110,7 +274111,7 @@ async def index_swift_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swift_get_serialize( + _param = self._index_suse_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274142,7 +274143,7 @@ async def index_swift_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", '404': "str", '500': "str", } @@ -274158,7 +274159,7 @@ async def index_swift_get( @validate_call - async def index_swift_get_with_http_info( + async def index_suse_security_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274196,10 +274197,10 @@ async def index_swift_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"swift\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination]: + """Return vulnerability data stored in index \"suse-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` :param page: set the page number of the response :type page: int @@ -274271,7 +274272,7 @@ async def index_swift_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swift_get_serialize( + _param = self._index_suse_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274303,7 +274304,7 @@ async def index_swift_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", '404': "str", '500': "str", } @@ -274319,7 +274320,7 @@ async def index_swift_get_with_http_info( @validate_call - async def index_swift_get_without_preload_content( + async def index_suse_security_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274358,9 +274359,9 @@ async def index_swift_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"swift\" + """Return vulnerability data stored in index \"suse-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` :param page: set the page number of the response :type page: int @@ -274432,7 +274433,7 @@ async def index_swift_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swift_get_serialize( + _param = self._index_suse_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274464,7 +274465,7 @@ async def index_swift_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", '404': "str", '500': "str", } @@ -274475,7 +274476,7 @@ async def index_swift_get_without_preload_content( return response_data.response - def _index_swift_get_serialize( + def _index_suse_security_get_serialize( self, page, limit, @@ -274643,7 +274644,7 @@ def _index_swift_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/swift', + resource_path='/v3/index/suse-security', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -274660,7 +274661,7 @@ def _index_swift_get_serialize( @validate_call - async def index_swisslog_healthcare_get( + async def index_swift_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274698,10 +274699,10 @@ async def index_swisslog_healthcare_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"swisslog-healthcare\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"swift\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` :param page: set the page number of the response :type page: int @@ -274773,7 +274774,7 @@ async def index_swisslog_healthcare_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swisslog_healthcare_get_serialize( + _param = self._index_swift_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274805,7 +274806,7 @@ async def index_swisslog_healthcare_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -274821,7 +274822,7 @@ async def index_swisslog_healthcare_get( @validate_call - async def index_swisslog_healthcare_get_with_http_info( + async def index_swift_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274859,10 +274860,10 @@ async def index_swisslog_healthcare_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"swisslog-healthcare\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"swift\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` :param page: set the page number of the response :type page: int @@ -274934,7 +274935,7 @@ async def index_swisslog_healthcare_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swisslog_healthcare_get_serialize( + _param = self._index_swift_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274966,7 +274967,7 @@ async def index_swisslog_healthcare_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -274982,7 +274983,7 @@ async def index_swisslog_healthcare_get_with_http_info( @validate_call - async def index_swisslog_healthcare_get_without_preload_content( + async def index_swift_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275021,9 +275022,9 @@ async def index_swisslog_healthcare_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"swisslog-healthcare\" + """Return vulnerability data stored in index \"swift\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` :param page: set the page number of the response :type page: int @@ -275095,7 +275096,7 @@ async def index_swisslog_healthcare_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swisslog_healthcare_get_serialize( + _param = self._index_swift_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275127,7 +275128,7 @@ async def index_swisslog_healthcare_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -275138,7 +275139,7 @@ async def index_swisslog_healthcare_get_without_preload_content( return response_data.response - def _index_swisslog_healthcare_get_serialize( + def _index_swift_get_serialize( self, page, limit, @@ -275306,7 +275307,7 @@ def _index_swisslog_healthcare_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/swisslog-healthcare', + resource_path='/v3/index/swift', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -275323,7 +275324,7 @@ def _index_swisslog_healthcare_get_serialize( @validate_call - async def index_symfony_get( + async def index_swisslog_healthcare_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275361,10 +275362,10 @@ async def index_symfony_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination: - """Return vulnerability data stored in index \"symfony\" + ) -> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"swisslog-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -275436,7 +275437,7 @@ async def index_symfony_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_symfony_get_serialize( + _param = self._index_swisslog_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275468,7 +275469,7 @@ async def index_symfony_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -275484,7 +275485,7 @@ async def index_symfony_get( @validate_call - async def index_symfony_get_with_http_info( + async def index_swisslog_healthcare_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275522,10 +275523,10 @@ async def index_symfony_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination]: - """Return vulnerability data stored in index \"symfony\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"swisslog-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -275597,7 +275598,7 @@ async def index_symfony_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_symfony_get_serialize( + _param = self._index_swisslog_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275629,7 +275630,7 @@ async def index_symfony_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -275645,7 +275646,7 @@ async def index_symfony_get_with_http_info( @validate_call - async def index_symfony_get_without_preload_content( + async def index_swisslog_healthcare_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275684,9 +275685,9 @@ async def index_symfony_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"symfony\" + """Return vulnerability data stored in index \"swisslog-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -275758,7 +275759,7 @@ async def index_symfony_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_symfony_get_serialize( + _param = self._index_swisslog_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275790,7 +275791,7 @@ async def index_symfony_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -275801,7 +275802,7 @@ async def index_symfony_get_without_preload_content( return response_data.response - def _index_symfony_get_serialize( + def _index_swisslog_healthcare_get_serialize( self, page, limit, @@ -275969,7 +275970,7 @@ def _index_symfony_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/symfony', + resource_path='/v3/index/swisslog-healthcare', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -275986,7 +275987,7 @@ def _index_symfony_get_serialize( @validate_call - async def index_synacktiv_get( + async def index_symfony_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276024,10 +276025,10 @@ async def index_synacktiv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination: - """Return vulnerability data stored in index \"synacktiv\" + ) -> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination: + """Return vulnerability data stored in index \"symfony\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` :param page: set the page number of the response :type page: int @@ -276099,7 +276100,7 @@ async def index_synacktiv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synacktiv_get_serialize( + _param = self._index_symfony_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276131,7 +276132,7 @@ async def index_synacktiv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", '404': "str", '500': "str", } @@ -276147,7 +276148,7 @@ async def index_synacktiv_get( @validate_call - async def index_synacktiv_get_with_http_info( + async def index_symfony_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276185,10 +276186,10 @@ async def index_synacktiv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination]: - """Return vulnerability data stored in index \"synacktiv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination]: + """Return vulnerability data stored in index \"symfony\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` :param page: set the page number of the response :type page: int @@ -276260,7 +276261,7 @@ async def index_synacktiv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synacktiv_get_serialize( + _param = self._index_symfony_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276292,7 +276293,7 @@ async def index_synacktiv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", '404': "str", '500': "str", } @@ -276308,7 +276309,7 @@ async def index_synacktiv_get_with_http_info( @validate_call - async def index_synacktiv_get_without_preload_content( + async def index_symfony_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276347,9 +276348,9 @@ async def index_synacktiv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"synacktiv\" + """Return vulnerability data stored in index \"symfony\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` :param page: set the page number of the response :type page: int @@ -276421,7 +276422,7 @@ async def index_synacktiv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synacktiv_get_serialize( + _param = self._index_symfony_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276453,7 +276454,7 @@ async def index_synacktiv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", '404': "str", '500': "str", } @@ -276464,7 +276465,7 @@ async def index_synacktiv_get_without_preload_content( return response_data.response - def _index_synacktiv_get_serialize( + def _index_symfony_get_serialize( self, page, limit, @@ -276632,7 +276633,7 @@ def _index_synacktiv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/synacktiv', + resource_path='/v3/index/symfony', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -276649,7 +276650,7 @@ def _index_synacktiv_get_serialize( @validate_call - async def index_syncrosoft_get( + async def index_synacktiv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276687,10 +276688,10 @@ async def index_syncrosoft_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination: - """Return vulnerability data stored in index \"syncrosoft\" + ) -> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination: + """Return vulnerability data stored in index \"synacktiv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` :param page: set the page number of the response :type page: int @@ -276762,7 +276763,7 @@ async def index_syncrosoft_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syncrosoft_get_serialize( + _param = self._index_synacktiv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276794,7 +276795,7 @@ async def index_syncrosoft_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", '404': "str", '500': "str", } @@ -276810,7 +276811,7 @@ async def index_syncrosoft_get( @validate_call - async def index_syncrosoft_get_with_http_info( + async def index_synacktiv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276848,10 +276849,10 @@ async def index_syncrosoft_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination]: - """Return vulnerability data stored in index \"syncrosoft\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination]: + """Return vulnerability data stored in index \"synacktiv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` :param page: set the page number of the response :type page: int @@ -276923,7 +276924,7 @@ async def index_syncrosoft_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syncrosoft_get_serialize( + _param = self._index_synacktiv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276955,7 +276956,7 @@ async def index_syncrosoft_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", '404': "str", '500': "str", } @@ -276971,7 +276972,7 @@ async def index_syncrosoft_get_with_http_info( @validate_call - async def index_syncrosoft_get_without_preload_content( + async def index_synacktiv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277010,9 +277011,9 @@ async def index_syncrosoft_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"syncrosoft\" + """Return vulnerability data stored in index \"synacktiv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` :param page: set the page number of the response :type page: int @@ -277084,7 +277085,7 @@ async def index_syncrosoft_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syncrosoft_get_serialize( + _param = self._index_synacktiv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277116,7 +277117,7 @@ async def index_syncrosoft_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", '404': "str", '500': "str", } @@ -277127,7 +277128,7 @@ async def index_syncrosoft_get_without_preload_content( return response_data.response - def _index_syncrosoft_get_serialize( + def _index_synacktiv_get_serialize( self, page, limit, @@ -277295,7 +277296,7 @@ def _index_syncrosoft_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/syncrosoft', + resource_path='/v3/index/synacktiv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -277312,7 +277313,7 @@ def _index_syncrosoft_get_serialize( @validate_call - async def index_synology_get( + async def index_syncrosoft_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277350,10 +277351,10 @@ async def index_synology_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination: - """Return vulnerability data stored in index \"synology\" + ) -> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination: + """Return vulnerability data stored in index \"syncrosoft\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` :param page: set the page number of the response :type page: int @@ -277425,7 +277426,7 @@ async def index_synology_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synology_get_serialize( + _param = self._index_syncrosoft_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277457,7 +277458,7 @@ async def index_synology_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", '404': "str", '500': "str", } @@ -277473,7 +277474,7 @@ async def index_synology_get( @validate_call - async def index_synology_get_with_http_info( + async def index_syncrosoft_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277511,10 +277512,10 @@ async def index_synology_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination]: - """Return vulnerability data stored in index \"synology\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination]: + """Return vulnerability data stored in index \"syncrosoft\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` :param page: set the page number of the response :type page: int @@ -277586,7 +277587,7 @@ async def index_synology_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synology_get_serialize( + _param = self._index_syncrosoft_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277618,7 +277619,7 @@ async def index_synology_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", '404': "str", '500': "str", } @@ -277634,7 +277635,7 @@ async def index_synology_get_with_http_info( @validate_call - async def index_synology_get_without_preload_content( + async def index_syncrosoft_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277673,9 +277674,9 @@ async def index_synology_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"synology\" + """Return vulnerability data stored in index \"syncrosoft\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` :param page: set the page number of the response :type page: int @@ -277747,7 +277748,7 @@ async def index_synology_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synology_get_serialize( + _param = self._index_syncrosoft_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277779,7 +277780,7 @@ async def index_synology_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", '404': "str", '500': "str", } @@ -277790,7 +277791,7 @@ async def index_synology_get_without_preload_content( return response_data.response - def _index_synology_get_serialize( + def _index_syncrosoft_get_serialize( self, page, limit, @@ -277958,7 +277959,7 @@ def _index_synology_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/synology', + resource_path='/v3/index/syncrosoft', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -277975,7 +277976,7 @@ def _index_synology_get_serialize( @validate_call - async def index_syss_get( + async def index_synology_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278013,10 +278014,10 @@ async def index_syss_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination: - """Return vulnerability data stored in index \"syss\" + ) -> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination: + """Return vulnerability data stored in index \"synology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` :param page: set the page number of the response :type page: int @@ -278088,7 +278089,7 @@ async def index_syss_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syss_get_serialize( + _param = self._index_synology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278120,7 +278121,7 @@ async def index_syss_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", '404': "str", '500': "str", } @@ -278136,7 +278137,7 @@ async def index_syss_get( @validate_call - async def index_syss_get_with_http_info( + async def index_synology_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278174,10 +278175,10 @@ async def index_syss_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination]: - """Return vulnerability data stored in index \"syss\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination]: + """Return vulnerability data stored in index \"synology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` :param page: set the page number of the response :type page: int @@ -278249,7 +278250,7 @@ async def index_syss_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syss_get_serialize( + _param = self._index_synology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278281,7 +278282,7 @@ async def index_syss_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", '404': "str", '500': "str", } @@ -278297,7 +278298,7 @@ async def index_syss_get_with_http_info( @validate_call - async def index_syss_get_without_preload_content( + async def index_synology_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278336,9 +278337,9 @@ async def index_syss_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"syss\" + """Return vulnerability data stored in index \"synology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` :param page: set the page number of the response :type page: int @@ -278410,7 +278411,7 @@ async def index_syss_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syss_get_serialize( + _param = self._index_synology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278442,7 +278443,7 @@ async def index_syss_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", '404': "str", '500': "str", } @@ -278453,7 +278454,7 @@ async def index_syss_get_without_preload_content( return response_data.response - def _index_syss_get_serialize( + def _index_synology_get_serialize( self, page, limit, @@ -278621,7 +278622,7 @@ def _index_syss_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/syss', + resource_path='/v3/index/synology', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -278638,7 +278639,7 @@ def _index_syss_get_serialize( @validate_call - async def index_tailscale_get( + async def index_syss_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278676,10 +278677,10 @@ async def index_tailscale_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination: - """Return vulnerability data stored in index \"tailscale\" + ) -> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination: + """Return vulnerability data stored in index \"syss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` :param page: set the page number of the response :type page: int @@ -278751,7 +278752,7 @@ async def index_tailscale_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tailscale_get_serialize( + _param = self._index_syss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278783,7 +278784,7 @@ async def index_tailscale_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", '404': "str", '500': "str", } @@ -278799,7 +278800,7 @@ async def index_tailscale_get( @validate_call - async def index_tailscale_get_with_http_info( + async def index_syss_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278837,10 +278838,10 @@ async def index_tailscale_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination]: - """Return vulnerability data stored in index \"tailscale\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination]: + """Return vulnerability data stored in index \"syss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` :param page: set the page number of the response :type page: int @@ -278912,7 +278913,7 @@ async def index_tailscale_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tailscale_get_serialize( + _param = self._index_syss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278944,7 +278945,7 @@ async def index_tailscale_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", '404': "str", '500': "str", } @@ -278960,7 +278961,7 @@ async def index_tailscale_get_with_http_info( @validate_call - async def index_tailscale_get_without_preload_content( + async def index_syss_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278999,9 +279000,9 @@ async def index_tailscale_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tailscale\" + """Return vulnerability data stored in index \"syss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` :param page: set the page number of the response :type page: int @@ -279073,7 +279074,7 @@ async def index_tailscale_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tailscale_get_serialize( + _param = self._index_syss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279105,7 +279106,7 @@ async def index_tailscale_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", '404': "str", '500': "str", } @@ -279116,7 +279117,7 @@ async def index_tailscale_get_without_preload_content( return response_data.response - def _index_tailscale_get_serialize( + def _index_syss_get_serialize( self, page, limit, @@ -279284,7 +279285,7 @@ def _index_tailscale_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tailscale', + resource_path='/v3/index/syss', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -279301,7 +279302,7 @@ def _index_tailscale_get_serialize( @validate_call - async def index_teamviewer_get( + async def index_tailscale_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279339,10 +279340,10 @@ async def index_teamviewer_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination: - """Return vulnerability data stored in index \"teamviewer\" + ) -> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination: + """Return vulnerability data stored in index \"tailscale\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` :param page: set the page number of the response :type page: int @@ -279414,7 +279415,7 @@ async def index_teamviewer_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_teamviewer_get_serialize( + _param = self._index_tailscale_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279446,7 +279447,7 @@ async def index_teamviewer_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", '404': "str", '500': "str", } @@ -279462,7 +279463,7 @@ async def index_teamviewer_get( @validate_call - async def index_teamviewer_get_with_http_info( + async def index_tailscale_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279500,10 +279501,10 @@ async def index_teamviewer_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination]: - """Return vulnerability data stored in index \"teamviewer\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination]: + """Return vulnerability data stored in index \"tailscale\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` :param page: set the page number of the response :type page: int @@ -279575,7 +279576,7 @@ async def index_teamviewer_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_teamviewer_get_serialize( + _param = self._index_tailscale_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279607,7 +279608,7 @@ async def index_teamviewer_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", '404': "str", '500': "str", } @@ -279623,7 +279624,7 @@ async def index_teamviewer_get_with_http_info( @validate_call - async def index_teamviewer_get_without_preload_content( + async def index_tailscale_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279662,9 +279663,9 @@ async def index_teamviewer_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"teamviewer\" + """Return vulnerability data stored in index \"tailscale\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` :param page: set the page number of the response :type page: int @@ -279736,7 +279737,7 @@ async def index_teamviewer_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_teamviewer_get_serialize( + _param = self._index_tailscale_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279768,7 +279769,7 @@ async def index_teamviewer_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", '404': "str", '500': "str", } @@ -279779,7 +279780,7 @@ async def index_teamviewer_get_without_preload_content( return response_data.response - def _index_teamviewer_get_serialize( + def _index_tailscale_get_serialize( self, page, limit, @@ -279947,7 +279948,7 @@ def _index_teamviewer_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/teamviewer', + resource_path='/v3/index/tailscale', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -279964,7 +279965,7 @@ def _index_teamviewer_get_serialize( @validate_call - async def index_tenable_research_advisories_get( + async def index_teamviewer_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280002,10 +280003,10 @@ async def index_tenable_research_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"tenable-research-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination: + """Return vulnerability data stored in index \"teamviewer\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` :param page: set the page number of the response :type page: int @@ -280077,7 +280078,7 @@ async def index_tenable_research_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tenable_research_advisories_get_serialize( + _param = self._index_teamviewer_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280109,7 +280110,7 @@ async def index_tenable_research_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", '404': "str", '500': "str", } @@ -280125,7 +280126,7 @@ async def index_tenable_research_advisories_get( @validate_call - async def index_tenable_research_advisories_get_with_http_info( + async def index_teamviewer_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280163,10 +280164,10 @@ async def index_tenable_research_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"tenable-research-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination]: + """Return vulnerability data stored in index \"teamviewer\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` :param page: set the page number of the response :type page: int @@ -280238,7 +280239,7 @@ async def index_tenable_research_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tenable_research_advisories_get_serialize( + _param = self._index_teamviewer_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280270,7 +280271,7 @@ async def index_tenable_research_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", '404': "str", '500': "str", } @@ -280286,7 +280287,7 @@ async def index_tenable_research_advisories_get_with_http_info( @validate_call - async def index_tenable_research_advisories_get_without_preload_content( + async def index_teamviewer_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280325,9 +280326,9 @@ async def index_tenable_research_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tenable-research-advisories\" + """Return vulnerability data stored in index \"teamviewer\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` :param page: set the page number of the response :type page: int @@ -280399,7 +280400,7 @@ async def index_tenable_research_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tenable_research_advisories_get_serialize( + _param = self._index_teamviewer_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280431,7 +280432,7 @@ async def index_tenable_research_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", '404': "str", '500': "str", } @@ -280442,7 +280443,7 @@ async def index_tenable_research_advisories_get_without_preload_content( return response_data.response - def _index_tenable_research_advisories_get_serialize( + def _index_teamviewer_get_serialize( self, page, limit, @@ -280610,7 +280611,7 @@ def _index_tenable_research_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tenable-research-advisories', + resource_path='/v3/index/teamviewer', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -280627,7 +280628,7 @@ def _index_tenable_research_advisories_get_serialize( @validate_call - async def index_tencent_get( + async def index_tenable_research_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280665,10 +280666,10 @@ async def index_tencent_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination: - """Return vulnerability data stored in index \"tencent\" + ) -> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"tenable-research-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -280740,7 +280741,7 @@ async def index_tencent_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tencent_get_serialize( + _param = self._index_tenable_research_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280772,7 +280773,7 @@ async def index_tencent_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -280788,7 +280789,7 @@ async def index_tencent_get( @validate_call - async def index_tencent_get_with_http_info( + async def index_tenable_research_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280826,10 +280827,10 @@ async def index_tencent_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination]: - """Return vulnerability data stored in index \"tencent\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"tenable-research-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -280901,7 +280902,7 @@ async def index_tencent_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tencent_get_serialize( + _param = self._index_tenable_research_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280933,7 +280934,7 @@ async def index_tencent_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -280949,7 +280950,7 @@ async def index_tencent_get_with_http_info( @validate_call - async def index_tencent_get_without_preload_content( + async def index_tenable_research_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280988,9 +280989,9 @@ async def index_tencent_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tencent\" + """Return vulnerability data stored in index \"tenable-research-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -281062,7 +281063,7 @@ async def index_tencent_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tencent_get_serialize( + _param = self._index_tenable_research_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281094,7 +281095,7 @@ async def index_tencent_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -281105,7 +281106,7 @@ async def index_tencent_get_without_preload_content( return response_data.response - def _index_tencent_get_serialize( + def _index_tenable_research_advisories_get_serialize( self, page, limit, @@ -281273,7 +281274,7 @@ def _index_tencent_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tencent', + resource_path='/v3/index/tenable-research-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -281290,7 +281291,7 @@ def _index_tencent_get_serialize( @validate_call - async def index_thales_get( + async def index_tencent_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281328,10 +281329,10 @@ async def index_thales_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination: - """Return vulnerability data stored in index \"thales\" + ) -> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination: + """Return vulnerability data stored in index \"tencent\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` :param page: set the page number of the response :type page: int @@ -281403,7 +281404,7 @@ async def index_thales_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thales_get_serialize( + _param = self._index_tencent_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281435,7 +281436,7 @@ async def index_thales_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", '404': "str", '500': "str", } @@ -281451,7 +281452,7 @@ async def index_thales_get( @validate_call - async def index_thales_get_with_http_info( + async def index_tencent_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281489,10 +281490,10 @@ async def index_thales_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination]: - """Return vulnerability data stored in index \"thales\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination]: + """Return vulnerability data stored in index \"tencent\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` :param page: set the page number of the response :type page: int @@ -281564,7 +281565,7 @@ async def index_thales_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thales_get_serialize( + _param = self._index_tencent_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281596,7 +281597,7 @@ async def index_thales_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", '404': "str", '500': "str", } @@ -281612,7 +281613,7 @@ async def index_thales_get_with_http_info( @validate_call - async def index_thales_get_without_preload_content( + async def index_tencent_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281651,9 +281652,9 @@ async def index_thales_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"thales\" + """Return vulnerability data stored in index \"tencent\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` :param page: set the page number of the response :type page: int @@ -281725,7 +281726,7 @@ async def index_thales_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thales_get_serialize( + _param = self._index_tencent_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281757,7 +281758,7 @@ async def index_thales_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", '404': "str", '500': "str", } @@ -281768,7 +281769,7 @@ async def index_thales_get_without_preload_content( return response_data.response - def _index_thales_get_serialize( + def _index_tencent_get_serialize( self, page, limit, @@ -281936,7 +281937,7 @@ def _index_thales_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/thales', + resource_path='/v3/index/tencent', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -281953,7 +281954,7 @@ def _index_thales_get_serialize( @validate_call - async def index_themissinglink_get( + async def index_thales_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281991,10 +281992,10 @@ async def index_themissinglink_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination: - """Return vulnerability data stored in index \"themissinglink\" + ) -> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination: + """Return vulnerability data stored in index \"thales\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` :param page: set the page number of the response :type page: int @@ -282066,7 +282067,7 @@ async def index_themissinglink_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_themissinglink_get_serialize( + _param = self._index_thales_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282098,7 +282099,7 @@ async def index_themissinglink_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", '404': "str", '500': "str", } @@ -282114,7 +282115,7 @@ async def index_themissinglink_get( @validate_call - async def index_themissinglink_get_with_http_info( + async def index_thales_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282152,10 +282153,10 @@ async def index_themissinglink_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination]: - """Return vulnerability data stored in index \"themissinglink\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination]: + """Return vulnerability data stored in index \"thales\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` :param page: set the page number of the response :type page: int @@ -282227,7 +282228,7 @@ async def index_themissinglink_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_themissinglink_get_serialize( + _param = self._index_thales_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282259,7 +282260,7 @@ async def index_themissinglink_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", '404': "str", '500': "str", } @@ -282275,7 +282276,7 @@ async def index_themissinglink_get_with_http_info( @validate_call - async def index_themissinglink_get_without_preload_content( + async def index_thales_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282314,9 +282315,9 @@ async def index_themissinglink_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"themissinglink\" + """Return vulnerability data stored in index \"thales\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` :param page: set the page number of the response :type page: int @@ -282388,7 +282389,7 @@ async def index_themissinglink_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_themissinglink_get_serialize( + _param = self._index_thales_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282420,7 +282421,7 @@ async def index_themissinglink_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", '404': "str", '500': "str", } @@ -282431,7 +282432,7 @@ async def index_themissinglink_get_without_preload_content( return response_data.response - def _index_themissinglink_get_serialize( + def _index_thales_get_serialize( self, page, limit, @@ -282599,7 +282600,7 @@ def _index_themissinglink_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/themissinglink', + resource_path='/v3/index/thales', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -282616,7 +282617,7 @@ def _index_themissinglink_get_serialize( @validate_call - async def index_thermo_fisher_get( + async def index_themissinglink_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282654,10 +282655,10 @@ async def index_thermo_fisher_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination: - """Return vulnerability data stored in index \"thermo-fisher\" + ) -> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination: + """Return vulnerability data stored in index \"themissinglink\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` :param page: set the page number of the response :type page: int @@ -282729,7 +282730,7 @@ async def index_thermo_fisher_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thermo_fisher_get_serialize( + _param = self._index_themissinglink_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282761,7 +282762,7 @@ async def index_thermo_fisher_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", '404': "str", '500': "str", } @@ -282777,7 +282778,7 @@ async def index_thermo_fisher_get( @validate_call - async def index_thermo_fisher_get_with_http_info( + async def index_themissinglink_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282815,10 +282816,10 @@ async def index_thermo_fisher_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination]: - """Return vulnerability data stored in index \"thermo-fisher\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination]: + """Return vulnerability data stored in index \"themissinglink\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` :param page: set the page number of the response :type page: int @@ -282890,7 +282891,7 @@ async def index_thermo_fisher_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thermo_fisher_get_serialize( + _param = self._index_themissinglink_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282922,7 +282923,7 @@ async def index_thermo_fisher_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", '404': "str", '500': "str", } @@ -282938,7 +282939,7 @@ async def index_thermo_fisher_get_with_http_info( @validate_call - async def index_thermo_fisher_get_without_preload_content( + async def index_themissinglink_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282977,9 +282978,9 @@ async def index_thermo_fisher_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"thermo-fisher\" + """Return vulnerability data stored in index \"themissinglink\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` :param page: set the page number of the response :type page: int @@ -283051,7 +283052,7 @@ async def index_thermo_fisher_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thermo_fisher_get_serialize( + _param = self._index_themissinglink_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283083,7 +283084,7 @@ async def index_thermo_fisher_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", '404': "str", '500': "str", } @@ -283094,7 +283095,7 @@ async def index_thermo_fisher_get_without_preload_content( return response_data.response - def _index_thermo_fisher_get_serialize( + def _index_themissinglink_get_serialize( self, page, limit, @@ -283262,7 +283263,7 @@ def _index_thermo_fisher_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/thermo-fisher', + resource_path='/v3/index/themissinglink', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -283279,7 +283280,7 @@ def _index_thermo_fisher_get_serialize( @validate_call - async def index_threat_actors_get( + async def index_thermo_fisher_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283317,10 +283318,10 @@ async def index_threat_actors_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination: - """Return vulnerability data stored in index \"threat-actors\" + ) -> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination: + """Return vulnerability data stored in index \"thermo-fisher\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` :param page: set the page number of the response :type page: int @@ -283392,7 +283393,7 @@ async def index_threat_actors_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_threat_actors_get_serialize( + _param = self._index_thermo_fisher_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283424,7 +283425,7 @@ async def index_threat_actors_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", '404': "str", '500': "str", } @@ -283440,7 +283441,7 @@ async def index_threat_actors_get( @validate_call - async def index_threat_actors_get_with_http_info( + async def index_thermo_fisher_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283478,10 +283479,10 @@ async def index_threat_actors_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination]: - """Return vulnerability data stored in index \"threat-actors\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination]: + """Return vulnerability data stored in index \"thermo-fisher\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` :param page: set the page number of the response :type page: int @@ -283553,7 +283554,7 @@ async def index_threat_actors_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_threat_actors_get_serialize( + _param = self._index_thermo_fisher_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283585,7 +283586,7 @@ async def index_threat_actors_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", '404': "str", '500': "str", } @@ -283601,7 +283602,7 @@ async def index_threat_actors_get_with_http_info( @validate_call - async def index_threat_actors_get_without_preload_content( + async def index_thermo_fisher_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283640,9 +283641,9 @@ async def index_threat_actors_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"threat-actors\" + """Return vulnerability data stored in index \"thermo-fisher\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` :param page: set the page number of the response :type page: int @@ -283714,7 +283715,7 @@ async def index_threat_actors_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_threat_actors_get_serialize( + _param = self._index_thermo_fisher_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283746,7 +283747,7 @@ async def index_threat_actors_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", '404': "str", '500': "str", } @@ -283757,7 +283758,7 @@ async def index_threat_actors_get_without_preload_content( return response_data.response - def _index_threat_actors_get_serialize( + def _index_thermo_fisher_get_serialize( self, page, limit, @@ -283925,7 +283926,7 @@ def _index_threat_actors_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/threat-actors', + resource_path='/v3/index/thermo-fisher', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -283942,7 +283943,7 @@ def _index_threat_actors_get_serialize( @validate_call - async def index_ti_get( + async def index_threat_actors_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283980,10 +283981,10 @@ async def index_ti_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination: - """Return vulnerability data stored in index \"ti\" + ) -> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination: + """Return vulnerability data stored in index \"threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -284055,7 +284056,7 @@ async def index_ti_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ti_get_serialize( + _param = self._index_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284087,7 +284088,7 @@ async def index_ti_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", '404': "str", '500': "str", } @@ -284103,7 +284104,7 @@ async def index_ti_get( @validate_call - async def index_ti_get_with_http_info( + async def index_threat_actors_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284141,10 +284142,10 @@ async def index_ti_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination]: - """Return vulnerability data stored in index \"ti\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination]: + """Return vulnerability data stored in index \"threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -284216,7 +284217,7 @@ async def index_ti_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ti_get_serialize( + _param = self._index_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284248,7 +284249,7 @@ async def index_ti_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", '404': "str", '500': "str", } @@ -284264,7 +284265,7 @@ async def index_ti_get_with_http_info( @validate_call - async def index_ti_get_without_preload_content( + async def index_threat_actors_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284303,9 +284304,9 @@ async def index_ti_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ti\" + """Return vulnerability data stored in index \"threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -284377,7 +284378,7 @@ async def index_ti_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ti_get_serialize( + _param = self._index_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284409,7 +284410,7 @@ async def index_ti_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", '404': "str", '500': "str", } @@ -284420,7 +284421,7 @@ async def index_ti_get_without_preload_content( return response_data.response - def _index_ti_get_serialize( + def _index_threat_actors_get_serialize( self, page, limit, @@ -284588,7 +284589,7 @@ def _index_ti_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ti', + resource_path='/v3/index/threat-actors', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -284605,7 +284606,7 @@ def _index_ti_get_serialize( @validate_call - async def index_tibco_get( + async def index_ti_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284643,10 +284644,10 @@ async def index_tibco_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination: - """Return vulnerability data stored in index \"tibco\" + ) -> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination: + """Return vulnerability data stored in index \"ti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` :param page: set the page number of the response :type page: int @@ -284718,7 +284719,7 @@ async def index_tibco_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tibco_get_serialize( + _param = self._index_ti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284750,7 +284751,7 @@ async def index_tibco_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", '404': "str", '500': "str", } @@ -284766,7 +284767,7 @@ async def index_tibco_get( @validate_call - async def index_tibco_get_with_http_info( + async def index_ti_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284804,10 +284805,10 @@ async def index_tibco_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination]: - """Return vulnerability data stored in index \"tibco\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination]: + """Return vulnerability data stored in index \"ti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` :param page: set the page number of the response :type page: int @@ -284879,7 +284880,7 @@ async def index_tibco_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tibco_get_serialize( + _param = self._index_ti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284911,7 +284912,7 @@ async def index_tibco_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", '404': "str", '500': "str", } @@ -284927,7 +284928,7 @@ async def index_tibco_get_with_http_info( @validate_call - async def index_tibco_get_without_preload_content( + async def index_ti_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284966,9 +284967,9 @@ async def index_tibco_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tibco\" + """Return vulnerability data stored in index \"ti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` :param page: set the page number of the response :type page: int @@ -285040,7 +285041,7 @@ async def index_tibco_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tibco_get_serialize( + _param = self._index_ti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285072,7 +285073,7 @@ async def index_tibco_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", '404': "str", '500': "str", } @@ -285083,7 +285084,7 @@ async def index_tibco_get_without_preload_content( return response_data.response - def _index_tibco_get_serialize( + def _index_ti_get_serialize( self, page, limit, @@ -285251,7 +285252,7 @@ def _index_tibco_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tibco', + resource_path='/v3/index/ti', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -285268,7 +285269,7 @@ def _index_tibco_get_serialize( @validate_call - async def index_tp_link_get( + async def index_tibco_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285306,10 +285307,10 @@ async def index_tp_link_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination: - """Return vulnerability data stored in index \"tp-link\" + ) -> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination: + """Return vulnerability data stored in index \"tibco\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` :param page: set the page number of the response :type page: int @@ -285381,7 +285382,7 @@ async def index_tp_link_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tp_link_get_serialize( + _param = self._index_tibco_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285413,7 +285414,7 @@ async def index_tp_link_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", '404': "str", '500': "str", } @@ -285429,7 +285430,7 @@ async def index_tp_link_get( @validate_call - async def index_tp_link_get_with_http_info( + async def index_tibco_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285467,10 +285468,10 @@ async def index_tp_link_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination]: - """Return vulnerability data stored in index \"tp-link\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination]: + """Return vulnerability data stored in index \"tibco\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` :param page: set the page number of the response :type page: int @@ -285542,7 +285543,7 @@ async def index_tp_link_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tp_link_get_serialize( + _param = self._index_tibco_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285574,7 +285575,7 @@ async def index_tp_link_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", '404': "str", '500': "str", } @@ -285590,7 +285591,7 @@ async def index_tp_link_get_with_http_info( @validate_call - async def index_tp_link_get_without_preload_content( + async def index_tibco_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285629,9 +285630,9 @@ async def index_tp_link_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tp-link\" + """Return vulnerability data stored in index \"tibco\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` :param page: set the page number of the response :type page: int @@ -285703,7 +285704,7 @@ async def index_tp_link_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tp_link_get_serialize( + _param = self._index_tibco_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285735,7 +285736,7 @@ async def index_tp_link_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", '404': "str", '500': "str", } @@ -285746,7 +285747,7 @@ async def index_tp_link_get_without_preload_content( return response_data.response - def _index_tp_link_get_serialize( + def _index_tibco_get_serialize( self, page, limit, @@ -285914,7 +285915,7 @@ def _index_tp_link_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tp-link', + resource_path='/v3/index/tibco', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -285931,7 +285932,7 @@ def _index_tp_link_get_serialize( @validate_call - async def index_trane_technology_get( + async def index_tp_link_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285969,10 +285970,10 @@ async def index_trane_technology_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination: - """Return vulnerability data stored in index \"trane-technology\" + ) -> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination: + """Return vulnerability data stored in index \"tp-link\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` :param page: set the page number of the response :type page: int @@ -286044,7 +286045,7 @@ async def index_trane_technology_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trane_technology_get_serialize( + _param = self._index_tp_link_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286076,7 +286077,7 @@ async def index_trane_technology_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", '404': "str", '500': "str", } @@ -286092,7 +286093,7 @@ async def index_trane_technology_get( @validate_call - async def index_trane_technology_get_with_http_info( + async def index_tp_link_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286130,10 +286131,10 @@ async def index_trane_technology_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination]: - """Return vulnerability data stored in index \"trane-technology\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination]: + """Return vulnerability data stored in index \"tp-link\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` :param page: set the page number of the response :type page: int @@ -286205,7 +286206,7 @@ async def index_trane_technology_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trane_technology_get_serialize( + _param = self._index_tp_link_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286237,7 +286238,7 @@ async def index_trane_technology_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", '404': "str", '500': "str", } @@ -286253,7 +286254,7 @@ async def index_trane_technology_get_with_http_info( @validate_call - async def index_trane_technology_get_without_preload_content( + async def index_tp_link_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286292,9 +286293,9 @@ async def index_trane_technology_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"trane-technology\" + """Return vulnerability data stored in index \"tp-link\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` :param page: set the page number of the response :type page: int @@ -286366,7 +286367,7 @@ async def index_trane_technology_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trane_technology_get_serialize( + _param = self._index_tp_link_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286398,7 +286399,7 @@ async def index_trane_technology_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", '404': "str", '500': "str", } @@ -286409,7 +286410,7 @@ async def index_trane_technology_get_without_preload_content( return response_data.response - def _index_trane_technology_get_serialize( + def _index_tp_link_get_serialize( self, page, limit, @@ -286577,7 +286578,7 @@ def _index_trane_technology_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/trane-technology', + resource_path='/v3/index/tp-link', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -286594,7 +286595,7 @@ def _index_trane_technology_get_serialize( @validate_call - async def index_trendmicro_get( + async def index_trane_technology_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286632,10 +286633,10 @@ async def index_trendmicro_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination: - """Return vulnerability data stored in index \"trendmicro\" + ) -> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination: + """Return vulnerability data stored in index \"trane-technology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` :param page: set the page number of the response :type page: int @@ -286707,7 +286708,7 @@ async def index_trendmicro_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trendmicro_get_serialize( + _param = self._index_trane_technology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286739,7 +286740,7 @@ async def index_trendmicro_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", '404': "str", '500': "str", } @@ -286755,7 +286756,7 @@ async def index_trendmicro_get( @validate_call - async def index_trendmicro_get_with_http_info( + async def index_trane_technology_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286793,10 +286794,10 @@ async def index_trendmicro_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination]: - """Return vulnerability data stored in index \"trendmicro\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination]: + """Return vulnerability data stored in index \"trane-technology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` :param page: set the page number of the response :type page: int @@ -286868,7 +286869,7 @@ async def index_trendmicro_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trendmicro_get_serialize( + _param = self._index_trane_technology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286900,7 +286901,7 @@ async def index_trendmicro_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", '404': "str", '500': "str", } @@ -286916,7 +286917,7 @@ async def index_trendmicro_get_with_http_info( @validate_call - async def index_trendmicro_get_without_preload_content( + async def index_trane_technology_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286955,9 +286956,9 @@ async def index_trendmicro_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"trendmicro\" + """Return vulnerability data stored in index \"trane-technology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` :param page: set the page number of the response :type page: int @@ -287029,7 +287030,7 @@ async def index_trendmicro_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trendmicro_get_serialize( + _param = self._index_trane_technology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287061,7 +287062,7 @@ async def index_trendmicro_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", '404': "str", '500': "str", } @@ -287072,7 +287073,7 @@ async def index_trendmicro_get_without_preload_content( return response_data.response - def _index_trendmicro_get_serialize( + def _index_trane_technology_get_serialize( self, page, limit, @@ -287240,7 +287241,7 @@ def _index_trendmicro_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/trendmicro', + resource_path='/v3/index/trane-technology', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -287257,7 +287258,7 @@ def _index_trendmicro_get_serialize( @validate_call - async def index_trustwave_get( + async def index_trendmicro_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287295,10 +287296,10 @@ async def index_trustwave_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination: - """Return vulnerability data stored in index \"trustwave\" + ) -> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination: + """Return vulnerability data stored in index \"trendmicro\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` :param page: set the page number of the response :type page: int @@ -287370,7 +287371,7 @@ async def index_trustwave_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trustwave_get_serialize( + _param = self._index_trendmicro_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287402,7 +287403,7 @@ async def index_trustwave_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", '404': "str", '500': "str", } @@ -287418,7 +287419,7 @@ async def index_trustwave_get( @validate_call - async def index_trustwave_get_with_http_info( + async def index_trendmicro_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287456,10 +287457,10 @@ async def index_trustwave_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination]: - """Return vulnerability data stored in index \"trustwave\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination]: + """Return vulnerability data stored in index \"trendmicro\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` :param page: set the page number of the response :type page: int @@ -287531,7 +287532,7 @@ async def index_trustwave_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trustwave_get_serialize( + _param = self._index_trendmicro_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287563,7 +287564,7 @@ async def index_trustwave_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", '404': "str", '500': "str", } @@ -287579,7 +287580,7 @@ async def index_trustwave_get_with_http_info( @validate_call - async def index_trustwave_get_without_preload_content( + async def index_trendmicro_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287618,9 +287619,9 @@ async def index_trustwave_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"trustwave\" + """Return vulnerability data stored in index \"trendmicro\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` :param page: set the page number of the response :type page: int @@ -287692,7 +287693,7 @@ async def index_trustwave_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trustwave_get_serialize( + _param = self._index_trendmicro_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287724,7 +287725,7 @@ async def index_trustwave_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", '404': "str", '500': "str", } @@ -287735,7 +287736,7 @@ async def index_trustwave_get_without_preload_content( return response_data.response - def _index_trustwave_get_serialize( + def _index_trendmicro_get_serialize( self, page, limit, @@ -287903,7 +287904,7 @@ def _index_trustwave_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/trustwave', + resource_path='/v3/index/trendmicro', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -287920,7 +287921,7 @@ def _index_trustwave_get_serialize( @validate_call - async def index_twcert_get( + async def index_trustwave_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287958,10 +287959,10 @@ async def index_twcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"twcert\" + ) -> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination: + """Return vulnerability data stored in index \"trustwave\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` :param page: set the page number of the response :type page: int @@ -288033,7 +288034,7 @@ async def index_twcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_twcert_get_serialize( + _param = self._index_trustwave_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288065,7 +288066,7 @@ async def index_twcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", '404': "str", '500': "str", } @@ -288081,7 +288082,7 @@ async def index_twcert_get( @validate_call - async def index_twcert_get_with_http_info( + async def index_trustwave_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288119,10 +288120,10 @@ async def index_twcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"twcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination]: + """Return vulnerability data stored in index \"trustwave\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` :param page: set the page number of the response :type page: int @@ -288194,7 +288195,7 @@ async def index_twcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_twcert_get_serialize( + _param = self._index_trustwave_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288226,7 +288227,7 @@ async def index_twcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", '404': "str", '500': "str", } @@ -288242,7 +288243,7 @@ async def index_twcert_get_with_http_info( @validate_call - async def index_twcert_get_without_preload_content( + async def index_trustwave_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288281,9 +288282,9 @@ async def index_twcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"twcert\" + """Return vulnerability data stored in index \"trustwave\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` :param page: set the page number of the response :type page: int @@ -288355,7 +288356,7 @@ async def index_twcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_twcert_get_serialize( + _param = self._index_trustwave_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288387,7 +288388,7 @@ async def index_twcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", '404': "str", '500': "str", } @@ -288398,7 +288399,7 @@ async def index_twcert_get_without_preload_content( return response_data.response - def _index_twcert_get_serialize( + def _index_trustwave_get_serialize( self, page, limit, @@ -288566,7 +288567,7 @@ def _index_twcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/twcert', + resource_path='/v3/index/trustwave', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -288583,7 +288584,7 @@ def _index_twcert_get_serialize( @validate_call - async def index_ubiquiti_get( + async def index_twcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288621,10 +288622,10 @@ async def index_ubiquiti_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination: - """Return vulnerability data stored in index \"ubiquiti\" + ) -> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"twcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` :param page: set the page number of the response :type page: int @@ -288696,7 +288697,7 @@ async def index_ubiquiti_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubiquiti_get_serialize( + _param = self._index_twcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288728,7 +288729,7 @@ async def index_ubiquiti_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -288744,7 +288745,7 @@ async def index_ubiquiti_get( @validate_call - async def index_ubiquiti_get_with_http_info( + async def index_twcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288782,10 +288783,10 @@ async def index_ubiquiti_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination]: - """Return vulnerability data stored in index \"ubiquiti\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"twcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` :param page: set the page number of the response :type page: int @@ -288857,7 +288858,7 @@ async def index_ubiquiti_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubiquiti_get_serialize( + _param = self._index_twcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288889,7 +288890,7 @@ async def index_ubiquiti_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -288905,7 +288906,7 @@ async def index_ubiquiti_get_with_http_info( @validate_call - async def index_ubiquiti_get_without_preload_content( + async def index_twcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288944,9 +288945,9 @@ async def index_ubiquiti_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ubiquiti\" + """Return vulnerability data stored in index \"twcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` :param page: set the page number of the response :type page: int @@ -289018,7 +289019,7 @@ async def index_ubiquiti_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubiquiti_get_serialize( + _param = self._index_twcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289050,7 +289051,7 @@ async def index_ubiquiti_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -289061,7 +289062,7 @@ async def index_ubiquiti_get_without_preload_content( return response_data.response - def _index_ubiquiti_get_serialize( + def _index_twcert_get_serialize( self, page, limit, @@ -289229,7 +289230,7 @@ def _index_ubiquiti_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ubiquiti', + resource_path='/v3/index/twcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -289246,7 +289247,7 @@ def _index_ubiquiti_get_serialize( @validate_call - async def index_ubuntu_get( + async def index_ubiquiti_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289284,10 +289285,10 @@ async def index_ubuntu_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination: - """Return vulnerability data stored in index \"ubuntu\" + ) -> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination: + """Return vulnerability data stored in index \"ubiquiti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` :param page: set the page number of the response :type page: int @@ -289359,7 +289360,7 @@ async def index_ubuntu_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_get_serialize( + _param = self._index_ubiquiti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289391,7 +289392,7 @@ async def index_ubuntu_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", '404': "str", '500': "str", } @@ -289407,7 +289408,7 @@ async def index_ubuntu_get( @validate_call - async def index_ubuntu_get_with_http_info( + async def index_ubiquiti_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289445,10 +289446,10 @@ async def index_ubuntu_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination]: - """Return vulnerability data stored in index \"ubuntu\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination]: + """Return vulnerability data stored in index \"ubiquiti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` :param page: set the page number of the response :type page: int @@ -289520,7 +289521,7 @@ async def index_ubuntu_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_get_serialize( + _param = self._index_ubiquiti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289552,7 +289553,7 @@ async def index_ubuntu_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", '404': "str", '500': "str", } @@ -289568,7 +289569,7 @@ async def index_ubuntu_get_with_http_info( @validate_call - async def index_ubuntu_get_without_preload_content( + async def index_ubiquiti_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289607,9 +289608,9 @@ async def index_ubuntu_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ubuntu\" + """Return vulnerability data stored in index \"ubiquiti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` :param page: set the page number of the response :type page: int @@ -289681,7 +289682,7 @@ async def index_ubuntu_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_get_serialize( + _param = self._index_ubiquiti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289713,7 +289714,7 @@ async def index_ubuntu_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", '404': "str", '500': "str", } @@ -289724,7 +289725,7 @@ async def index_ubuntu_get_without_preload_content( return response_data.response - def _index_ubuntu_get_serialize( + def _index_ubiquiti_get_serialize( self, page, limit, @@ -289892,7 +289893,7 @@ def _index_ubuntu_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ubuntu', + resource_path='/v3/index/ubiquiti', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -289909,7 +289910,7 @@ def _index_ubuntu_get_serialize( @validate_call - async def index_ubuntu_purls_get( + async def index_ubuntu_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289947,10 +289948,10 @@ async def index_ubuntu_purls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: - """Return vulnerability data stored in index \"ubuntu-purls\" + ) -> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination: + """Return vulnerability data stored in index \"ubuntu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` :param page: set the page number of the response :type page: int @@ -290022,7 +290023,7 @@ async def index_ubuntu_purls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_purls_get_serialize( + _param = self._index_ubuntu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290054,7 +290055,7 @@ async def index_ubuntu_purls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", '404': "str", '500': "str", } @@ -290070,7 +290071,7 @@ async def index_ubuntu_purls_get( @validate_call - async def index_ubuntu_purls_get_with_http_info( + async def index_ubuntu_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290108,10 +290109,10 @@ async def index_ubuntu_purls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: - """Return vulnerability data stored in index \"ubuntu-purls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination]: + """Return vulnerability data stored in index \"ubuntu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` :param page: set the page number of the response :type page: int @@ -290183,7 +290184,7 @@ async def index_ubuntu_purls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_purls_get_serialize( + _param = self._index_ubuntu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290215,7 +290216,7 @@ async def index_ubuntu_purls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", '404': "str", '500': "str", } @@ -290231,7 +290232,7 @@ async def index_ubuntu_purls_get_with_http_info( @validate_call - async def index_ubuntu_purls_get_without_preload_content( + async def index_ubuntu_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290270,9 +290271,9 @@ async def index_ubuntu_purls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ubuntu-purls\" + """Return vulnerability data stored in index \"ubuntu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` :param page: set the page number of the response :type page: int @@ -290344,7 +290345,7 @@ async def index_ubuntu_purls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_purls_get_serialize( + _param = self._index_ubuntu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290376,7 +290377,7 @@ async def index_ubuntu_purls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", '404': "str", '500': "str", } @@ -290387,7 +290388,7 @@ async def index_ubuntu_purls_get_without_preload_content( return response_data.response - def _index_ubuntu_purls_get_serialize( + def _index_ubuntu_get_serialize( self, page, limit, @@ -290555,7 +290556,7 @@ def _index_ubuntu_purls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ubuntu-purls', + resource_path='/v3/index/ubuntu', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -290572,7 +290573,7 @@ def _index_ubuntu_purls_get_serialize( @validate_call - async def index_unify_get( + async def index_ubuntu_purls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290610,10 +290611,10 @@ async def index_unify_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination: - """Return vulnerability data stored in index \"unify\" + ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: + """Return vulnerability data stored in index \"ubuntu-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` :param page: set the page number of the response :type page: int @@ -290685,7 +290686,7 @@ async def index_unify_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unify_get_serialize( + _param = self._index_ubuntu_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290717,7 +290718,7 @@ async def index_unify_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -290733,7 +290734,7 @@ async def index_unify_get( @validate_call - async def index_unify_get_with_http_info( + async def index_ubuntu_purls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290771,10 +290772,10 @@ async def index_unify_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination]: - """Return vulnerability data stored in index \"unify\" + ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: + """Return vulnerability data stored in index \"ubuntu-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` :param page: set the page number of the response :type page: int @@ -290846,7 +290847,7 @@ async def index_unify_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unify_get_serialize( + _param = self._index_ubuntu_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290878,7 +290879,7 @@ async def index_unify_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -290894,7 +290895,7 @@ async def index_unify_get_with_http_info( @validate_call - async def index_unify_get_without_preload_content( + async def index_ubuntu_purls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290933,9 +290934,9 @@ async def index_unify_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"unify\" + """Return vulnerability data stored in index \"ubuntu-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` :param page: set the page number of the response :type page: int @@ -291007,7 +291008,7 @@ async def index_unify_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unify_get_serialize( + _param = self._index_ubuntu_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291039,7 +291040,7 @@ async def index_unify_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -291050,7 +291051,7 @@ async def index_unify_get_without_preload_content( return response_data.response - def _index_unify_get_serialize( + def _index_ubuntu_purls_get_serialize( self, page, limit, @@ -291218,7 +291219,7 @@ def _index_unify_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/unify', + resource_path='/v3/index/ubuntu-purls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -291235,7 +291236,7 @@ def _index_unify_get_serialize( @validate_call - async def index_unisoc_get( + async def index_unify_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291273,10 +291274,10 @@ async def index_unisoc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination: - """Return vulnerability data stored in index \"unisoc\" + ) -> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination: + """Return vulnerability data stored in index \"unify\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` :param page: set the page number of the response :type page: int @@ -291348,7 +291349,7 @@ async def index_unisoc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unisoc_get_serialize( + _param = self._index_unify_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291380,7 +291381,7 @@ async def index_unisoc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", '404': "str", '500': "str", } @@ -291396,7 +291397,7 @@ async def index_unisoc_get( @validate_call - async def index_unisoc_get_with_http_info( + async def index_unify_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291434,10 +291435,10 @@ async def index_unisoc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination]: - """Return vulnerability data stored in index \"unisoc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination]: + """Return vulnerability data stored in index \"unify\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` :param page: set the page number of the response :type page: int @@ -291509,7 +291510,7 @@ async def index_unisoc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unisoc_get_serialize( + _param = self._index_unify_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291541,7 +291542,7 @@ async def index_unisoc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", '404': "str", '500': "str", } @@ -291557,7 +291558,7 @@ async def index_unisoc_get_with_http_info( @validate_call - async def index_unisoc_get_without_preload_content( + async def index_unify_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291596,9 +291597,9 @@ async def index_unisoc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"unisoc\" + """Return vulnerability data stored in index \"unify\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` :param page: set the page number of the response :type page: int @@ -291670,7 +291671,7 @@ async def index_unisoc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unisoc_get_serialize( + _param = self._index_unify_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291702,7 +291703,7 @@ async def index_unisoc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", '404': "str", '500': "str", } @@ -291713,7 +291714,7 @@ async def index_unisoc_get_without_preload_content( return response_data.response - def _index_unisoc_get_serialize( + def _index_unify_get_serialize( self, page, limit, @@ -291881,7 +291882,7 @@ def _index_unisoc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/unisoc', + resource_path='/v3/index/unify', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -291898,7 +291899,7 @@ def _index_unisoc_get_serialize( @validate_call - async def index_usd_get( + async def index_unisoc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291936,10 +291937,10 @@ async def index_usd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination: - """Return vulnerability data stored in index \"usd\" + ) -> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination: + """Return vulnerability data stored in index \"unisoc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` :param page: set the page number of the response :type page: int @@ -292011,7 +292012,7 @@ async def index_usd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usd_get_serialize( + _param = self._index_unisoc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292043,7 +292044,7 @@ async def index_usd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", '404': "str", '500': "str", } @@ -292059,7 +292060,7 @@ async def index_usd_get( @validate_call - async def index_usd_get_with_http_info( + async def index_unisoc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292097,10 +292098,10 @@ async def index_usd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination]: - """Return vulnerability data stored in index \"usd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination]: + """Return vulnerability data stored in index \"unisoc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` :param page: set the page number of the response :type page: int @@ -292172,7 +292173,7 @@ async def index_usd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usd_get_serialize( + _param = self._index_unisoc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292204,7 +292205,7 @@ async def index_usd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", '404': "str", '500': "str", } @@ -292220,7 +292221,7 @@ async def index_usd_get_with_http_info( @validate_call - async def index_usd_get_without_preload_content( + async def index_unisoc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292259,9 +292260,9 @@ async def index_usd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"usd\" + """Return vulnerability data stored in index \"unisoc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` :param page: set the page number of the response :type page: int @@ -292333,7 +292334,7 @@ async def index_usd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usd_get_serialize( + _param = self._index_unisoc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292365,7 +292366,7 @@ async def index_usd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", '404': "str", '500': "str", } @@ -292376,7 +292377,7 @@ async def index_usd_get_without_preload_content( return response_data.response - def _index_usd_get_serialize( + def _index_unisoc_get_serialize( self, page, limit, @@ -292544,7 +292545,7 @@ def _index_usd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/usd', + resource_path='/v3/index/unisoc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -292561,7 +292562,7 @@ def _index_usd_get_serialize( @validate_call - async def index_usom_get( + async def index_usd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292599,10 +292600,10 @@ async def index_usom_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"usom\" + ) -> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination: + """Return vulnerability data stored in index \"usd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` :param page: set the page number of the response :type page: int @@ -292674,7 +292675,7 @@ async def index_usom_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usom_get_serialize( + _param = self._index_usd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292706,7 +292707,7 @@ async def index_usom_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", '404': "str", '500': "str", } @@ -292722,7 +292723,7 @@ async def index_usom_get( @validate_call - async def index_usom_get_with_http_info( + async def index_usd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292760,10 +292761,10 @@ async def index_usom_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"usom\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination]: + """Return vulnerability data stored in index \"usd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` :param page: set the page number of the response :type page: int @@ -292835,7 +292836,7 @@ async def index_usom_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usom_get_serialize( + _param = self._index_usd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292867,7 +292868,7 @@ async def index_usom_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", '404': "str", '500': "str", } @@ -292883,7 +292884,7 @@ async def index_usom_get_with_http_info( @validate_call - async def index_usom_get_without_preload_content( + async def index_usd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292922,9 +292923,9 @@ async def index_usom_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"usom\" + """Return vulnerability data stored in index \"usd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` :param page: set the page number of the response :type page: int @@ -292996,7 +292997,7 @@ async def index_usom_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usom_get_serialize( + _param = self._index_usd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293028,7 +293029,7 @@ async def index_usom_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", '404': "str", '500': "str", } @@ -293039,7 +293040,7 @@ async def index_usom_get_without_preload_content( return response_data.response - def _index_usom_get_serialize( + def _index_usd_get_serialize( self, page, limit, @@ -293207,7 +293208,7 @@ def _index_usom_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/usom', + resource_path='/v3/index/usd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -293224,7 +293225,7 @@ def _index_usom_get_serialize( @validate_call - async def index_vandyke_get( + async def index_usom_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293262,10 +293263,10 @@ async def index_vandyke_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination: - """Return vulnerability data stored in index \"vandyke\" + ) -> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"usom\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` :param page: set the page number of the response :type page: int @@ -293337,7 +293338,7 @@ async def index_vandyke_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vandyke_get_serialize( + _param = self._index_usom_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293369,7 +293370,7 @@ async def index_vandyke_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -293385,7 +293386,7 @@ async def index_vandyke_get( @validate_call - async def index_vandyke_get_with_http_info( + async def index_usom_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293423,10 +293424,10 @@ async def index_vandyke_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination]: - """Return vulnerability data stored in index \"vandyke\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"usom\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` :param page: set the page number of the response :type page: int @@ -293498,7 +293499,7 @@ async def index_vandyke_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vandyke_get_serialize( + _param = self._index_usom_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293530,7 +293531,7 @@ async def index_vandyke_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -293546,7 +293547,7 @@ async def index_vandyke_get_with_http_info( @validate_call - async def index_vandyke_get_without_preload_content( + async def index_usom_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293585,9 +293586,9 @@ async def index_vandyke_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vandyke\" + """Return vulnerability data stored in index \"usom\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` :param page: set the page number of the response :type page: int @@ -293659,7 +293660,7 @@ async def index_vandyke_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vandyke_get_serialize( + _param = self._index_usom_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293691,7 +293692,7 @@ async def index_vandyke_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -293702,7 +293703,7 @@ async def index_vandyke_get_without_preload_content( return response_data.response - def _index_vandyke_get_serialize( + def _index_usom_get_serialize( self, page, limit, @@ -293870,7 +293871,7 @@ def _index_vandyke_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vandyke', + resource_path='/v3/index/usom', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -293887,7 +293888,7 @@ def _index_vandyke_get_serialize( @validate_call - async def index_vapidlabs_get( + async def index_vandyke_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293925,10 +293926,10 @@ async def index_vapidlabs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vapidlabs\" + ) -> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination: + """Return vulnerability data stored in index \"vandyke\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` :param page: set the page number of the response :type page: int @@ -294000,7 +294001,7 @@ async def index_vapidlabs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vapidlabs_get_serialize( + _param = self._index_vandyke_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294032,7 +294033,7 @@ async def index_vapidlabs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", '404': "str", '500': "str", } @@ -294048,7 +294049,7 @@ async def index_vapidlabs_get( @validate_call - async def index_vapidlabs_get_with_http_info( + async def index_vandyke_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294086,10 +294087,10 @@ async def index_vapidlabs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vapidlabs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination]: + """Return vulnerability data stored in index \"vandyke\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` :param page: set the page number of the response :type page: int @@ -294161,7 +294162,7 @@ async def index_vapidlabs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vapidlabs_get_serialize( + _param = self._index_vandyke_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294193,7 +294194,7 @@ async def index_vapidlabs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", '404': "str", '500': "str", } @@ -294209,7 +294210,7 @@ async def index_vapidlabs_get_with_http_info( @validate_call - async def index_vapidlabs_get_without_preload_content( + async def index_vandyke_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294248,9 +294249,9 @@ async def index_vapidlabs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vapidlabs\" + """Return vulnerability data stored in index \"vandyke\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` :param page: set the page number of the response :type page: int @@ -294322,7 +294323,7 @@ async def index_vapidlabs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vapidlabs_get_serialize( + _param = self._index_vandyke_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294354,7 +294355,7 @@ async def index_vapidlabs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", '404': "str", '500': "str", } @@ -294365,7 +294366,7 @@ async def index_vapidlabs_get_without_preload_content( return response_data.response - def _index_vapidlabs_get_serialize( + def _index_vandyke_get_serialize( self, page, limit, @@ -294533,7 +294534,7 @@ def _index_vapidlabs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vapidlabs', + resource_path='/v3/index/vandyke', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -294550,7 +294551,7 @@ def _index_vapidlabs_get_serialize( @validate_call - async def index_vc_cpe_dictionary_get( + async def index_vapidlabs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294588,10 +294589,10 @@ async def index_vc_cpe_dictionary_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination: - """Return vulnerability data stored in index \"vc-cpe-dictionary\" + ) -> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vapidlabs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` :param page: set the page number of the response :type page: int @@ -294663,7 +294664,7 @@ async def index_vc_cpe_dictionary_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vc_cpe_dictionary_get_serialize( + _param = self._index_vapidlabs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294695,7 +294696,7 @@ async def index_vc_cpe_dictionary_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -294711,7 +294712,7 @@ async def index_vc_cpe_dictionary_get( @validate_call - async def index_vc_cpe_dictionary_get_with_http_info( + async def index_vapidlabs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294749,10 +294750,10 @@ async def index_vc_cpe_dictionary_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination]: - """Return vulnerability data stored in index \"vc-cpe-dictionary\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vapidlabs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` :param page: set the page number of the response :type page: int @@ -294824,7 +294825,7 @@ async def index_vc_cpe_dictionary_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vc_cpe_dictionary_get_serialize( + _param = self._index_vapidlabs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294856,7 +294857,7 @@ async def index_vc_cpe_dictionary_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -294872,7 +294873,7 @@ async def index_vc_cpe_dictionary_get_with_http_info( @validate_call - async def index_vc_cpe_dictionary_get_without_preload_content( + async def index_vapidlabs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294911,9 +294912,9 @@ async def index_vc_cpe_dictionary_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vc-cpe-dictionary\" + """Return vulnerability data stored in index \"vapidlabs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` :param page: set the page number of the response :type page: int @@ -294985,7 +294986,7 @@ async def index_vc_cpe_dictionary_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vc_cpe_dictionary_get_serialize( + _param = self._index_vapidlabs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295017,7 +295018,7 @@ async def index_vc_cpe_dictionary_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -295028,7 +295029,7 @@ async def index_vc_cpe_dictionary_get_without_preload_content( return response_data.response - def _index_vc_cpe_dictionary_get_serialize( + def _index_vapidlabs_get_serialize( self, page, limit, @@ -295196,7 +295197,7 @@ def _index_vc_cpe_dictionary_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vc-cpe-dictionary', + resource_path='/v3/index/vapidlabs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -295213,7 +295214,7 @@ def _index_vc_cpe_dictionary_get_serialize( @validate_call - async def index_vde_get( + async def index_vc_cpe_dictionary_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295251,10 +295252,10 @@ async def index_vde_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vde\" + ) -> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination: + """Return vulnerability data stored in index \"vc-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -295326,7 +295327,7 @@ async def index_vde_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vde_get_serialize( + _param = self._index_vc_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295358,7 +295359,7 @@ async def index_vde_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -295374,7 +295375,7 @@ async def index_vde_get( @validate_call - async def index_vde_get_with_http_info( + async def index_vc_cpe_dictionary_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295412,10 +295413,10 @@ async def index_vde_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vde\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination]: + """Return vulnerability data stored in index \"vc-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -295487,7 +295488,7 @@ async def index_vde_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vde_get_serialize( + _param = self._index_vc_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295519,7 +295520,7 @@ async def index_vde_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -295535,7 +295536,7 @@ async def index_vde_get_with_http_info( @validate_call - async def index_vde_get_without_preload_content( + async def index_vc_cpe_dictionary_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295574,9 +295575,9 @@ async def index_vde_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vde\" + """Return vulnerability data stored in index \"vc-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -295648,7 +295649,7 @@ async def index_vde_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vde_get_serialize( + _param = self._index_vc_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295680,7 +295681,7 @@ async def index_vde_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -295691,7 +295692,7 @@ async def index_vde_get_without_preload_content( return response_data.response - def _index_vde_get_serialize( + def _index_vc_cpe_dictionary_get_serialize( self, page, limit, @@ -295859,7 +295860,7 @@ def _index_vde_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vde', + resource_path='/v3/index/vc-cpe-dictionary', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -295876,7 +295877,7 @@ def _index_vde_get_serialize( @validate_call - async def index_veeam_get( + async def index_vde_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295914,10 +295915,10 @@ async def index_veeam_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination: - """Return vulnerability data stored in index \"veeam\" + ) -> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vde\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` :param page: set the page number of the response :type page: int @@ -295989,7 +295990,7 @@ async def index_veeam_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veeam_get_serialize( + _param = self._index_vde_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296021,7 +296022,7 @@ async def index_veeam_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -296037,7 +296038,7 @@ async def index_veeam_get( @validate_call - async def index_veeam_get_with_http_info( + async def index_vde_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296075,10 +296076,10 @@ async def index_veeam_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination]: - """Return vulnerability data stored in index \"veeam\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vde\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` :param page: set the page number of the response :type page: int @@ -296150,7 +296151,7 @@ async def index_veeam_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veeam_get_serialize( + _param = self._index_vde_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296182,7 +296183,7 @@ async def index_veeam_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -296198,7 +296199,7 @@ async def index_veeam_get_with_http_info( @validate_call - async def index_veeam_get_without_preload_content( + async def index_vde_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296237,9 +296238,9 @@ async def index_veeam_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"veeam\" + """Return vulnerability data stored in index \"vde\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` :param page: set the page number of the response :type page: int @@ -296311,7 +296312,7 @@ async def index_veeam_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veeam_get_serialize( + _param = self._index_vde_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296343,7 +296344,7 @@ async def index_veeam_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -296354,7 +296355,7 @@ async def index_veeam_get_without_preload_content( return response_data.response - def _index_veeam_get_serialize( + def _index_vde_get_serialize( self, page, limit, @@ -296522,7 +296523,7 @@ def _index_veeam_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/veeam', + resource_path='/v3/index/vde', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -296539,7 +296540,7 @@ def _index_veeam_get_serialize( @validate_call - async def index_veritas_get( + async def index_veeam_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296577,10 +296578,10 @@ async def index_veritas_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination: - """Return vulnerability data stored in index \"veritas\" + ) -> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination: + """Return vulnerability data stored in index \"veeam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` :param page: set the page number of the response :type page: int @@ -296652,7 +296653,7 @@ async def index_veritas_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veritas_get_serialize( + _param = self._index_veeam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296684,7 +296685,7 @@ async def index_veritas_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", '404': "str", '500': "str", } @@ -296700,7 +296701,7 @@ async def index_veritas_get( @validate_call - async def index_veritas_get_with_http_info( + async def index_veeam_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296738,10 +296739,10 @@ async def index_veritas_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination]: - """Return vulnerability data stored in index \"veritas\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination]: + """Return vulnerability data stored in index \"veeam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` :param page: set the page number of the response :type page: int @@ -296813,7 +296814,7 @@ async def index_veritas_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veritas_get_serialize( + _param = self._index_veeam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296845,7 +296846,7 @@ async def index_veritas_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", '404': "str", '500': "str", } @@ -296861,7 +296862,7 @@ async def index_veritas_get_with_http_info( @validate_call - async def index_veritas_get_without_preload_content( + async def index_veeam_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296900,9 +296901,9 @@ async def index_veritas_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"veritas\" + """Return vulnerability data stored in index \"veeam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` :param page: set the page number of the response :type page: int @@ -296974,7 +296975,7 @@ async def index_veritas_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veritas_get_serialize( + _param = self._index_veeam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297006,7 +297007,7 @@ async def index_veritas_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", '404': "str", '500': "str", } @@ -297017,7 +297018,7 @@ async def index_veritas_get_without_preload_content( return response_data.response - def _index_veritas_get_serialize( + def _index_veeam_get_serialize( self, page, limit, @@ -297185,7 +297186,7 @@ def _index_veritas_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/veritas', + resource_path='/v3/index/veeam', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -297202,7 +297203,7 @@ def _index_veritas_get_serialize( @validate_call - async def index_virtuozzo_get( + async def index_veritas_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297240,10 +297241,10 @@ async def index_virtuozzo_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination: - """Return vulnerability data stored in index \"virtuozzo\" + ) -> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination: + """Return vulnerability data stored in index \"veritas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` :param page: set the page number of the response :type page: int @@ -297315,7 +297316,7 @@ async def index_virtuozzo_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_virtuozzo_get_serialize( + _param = self._index_veritas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297347,7 +297348,7 @@ async def index_virtuozzo_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", '404': "str", '500': "str", } @@ -297363,7 +297364,7 @@ async def index_virtuozzo_get( @validate_call - async def index_virtuozzo_get_with_http_info( + async def index_veritas_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297401,10 +297402,10 @@ async def index_virtuozzo_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination]: - """Return vulnerability data stored in index \"virtuozzo\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination]: + """Return vulnerability data stored in index \"veritas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` :param page: set the page number of the response :type page: int @@ -297476,7 +297477,7 @@ async def index_virtuozzo_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_virtuozzo_get_serialize( + _param = self._index_veritas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297508,7 +297509,7 @@ async def index_virtuozzo_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", '404': "str", '500': "str", } @@ -297524,7 +297525,7 @@ async def index_virtuozzo_get_with_http_info( @validate_call - async def index_virtuozzo_get_without_preload_content( + async def index_veritas_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297563,9 +297564,9 @@ async def index_virtuozzo_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"virtuozzo\" + """Return vulnerability data stored in index \"veritas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` :param page: set the page number of the response :type page: int @@ -297637,7 +297638,7 @@ async def index_virtuozzo_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_virtuozzo_get_serialize( + _param = self._index_veritas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297669,7 +297670,7 @@ async def index_virtuozzo_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", '404': "str", '500': "str", } @@ -297680,7 +297681,7 @@ async def index_virtuozzo_get_without_preload_content( return response_data.response - def _index_virtuozzo_get_serialize( + def _index_veritas_get_serialize( self, page, limit, @@ -297848,7 +297849,7 @@ def _index_virtuozzo_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/virtuozzo', + resource_path='/v3/index/veritas', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -297865,7 +297866,7 @@ def _index_virtuozzo_get_serialize( @validate_call - async def index_vlc_get( + async def index_virtuozzo_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297903,10 +297904,10 @@ async def index_vlc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination: - """Return vulnerability data stored in index \"vlc\" + ) -> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination: + """Return vulnerability data stored in index \"virtuozzo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` :param page: set the page number of the response :type page: int @@ -297978,7 +297979,7 @@ async def index_vlc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vlc_get_serialize( + _param = self._index_virtuozzo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298010,7 +298011,7 @@ async def index_vlc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", '404': "str", '500': "str", } @@ -298026,7 +298027,7 @@ async def index_vlc_get( @validate_call - async def index_vlc_get_with_http_info( + async def index_virtuozzo_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298064,10 +298065,10 @@ async def index_vlc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination]: - """Return vulnerability data stored in index \"vlc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination]: + """Return vulnerability data stored in index \"virtuozzo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` :param page: set the page number of the response :type page: int @@ -298139,7 +298140,7 @@ async def index_vlc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vlc_get_serialize( + _param = self._index_virtuozzo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298171,7 +298172,7 @@ async def index_vlc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", '404': "str", '500': "str", } @@ -298187,7 +298188,7 @@ async def index_vlc_get_with_http_info( @validate_call - async def index_vlc_get_without_preload_content( + async def index_virtuozzo_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298226,9 +298227,9 @@ async def index_vlc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vlc\" + """Return vulnerability data stored in index \"virtuozzo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` :param page: set the page number of the response :type page: int @@ -298300,7 +298301,7 @@ async def index_vlc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vlc_get_serialize( + _param = self._index_virtuozzo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298332,7 +298333,7 @@ async def index_vlc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", '404': "str", '500': "str", } @@ -298343,7 +298344,7 @@ async def index_vlc_get_without_preload_content( return response_data.response - def _index_vlc_get_serialize( + def _index_virtuozzo_get_serialize( self, page, limit, @@ -298511,7 +298512,7 @@ def _index_vlc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vlc', + resource_path='/v3/index/virtuozzo', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -298528,7 +298529,7 @@ def _index_vlc_get_serialize( @validate_call - async def index_vmware_get( + async def index_vlc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298566,10 +298567,10 @@ async def index_vmware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vmware\" + ) -> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination: + """Return vulnerability data stored in index \"vlc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` :param page: set the page number of the response :type page: int @@ -298641,7 +298642,7 @@ async def index_vmware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vmware_get_serialize( + _param = self._index_vlc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298673,7 +298674,7 @@ async def index_vmware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", '404': "str", '500': "str", } @@ -298689,7 +298690,7 @@ async def index_vmware_get( @validate_call - async def index_vmware_get_with_http_info( + async def index_vlc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298727,10 +298728,10 @@ async def index_vmware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vmware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination]: + """Return vulnerability data stored in index \"vlc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` :param page: set the page number of the response :type page: int @@ -298802,7 +298803,7 @@ async def index_vmware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vmware_get_serialize( + _param = self._index_vlc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298834,7 +298835,7 @@ async def index_vmware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", '404': "str", '500': "str", } @@ -298850,7 +298851,7 @@ async def index_vmware_get_with_http_info( @validate_call - async def index_vmware_get_without_preload_content( + async def index_vlc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298889,9 +298890,9 @@ async def index_vmware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vmware\" + """Return vulnerability data stored in index \"vlc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` :param page: set the page number of the response :type page: int @@ -298963,7 +298964,7 @@ async def index_vmware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vmware_get_serialize( + _param = self._index_vlc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298995,7 +298996,7 @@ async def index_vmware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", '404': "str", '500': "str", } @@ -299006,7 +299007,7 @@ async def index_vmware_get_without_preload_content( return response_data.response - def _index_vmware_get_serialize( + def _index_vlc_get_serialize( self, page, limit, @@ -299174,7 +299175,7 @@ def _index_vmware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vmware', + resource_path='/v3/index/vlc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -299191,7 +299192,7 @@ def _index_vmware_get_serialize( @validate_call - async def index_voidsec_get( + async def index_vmware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299229,10 +299230,10 @@ async def index_voidsec_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination: - """Return vulnerability data stored in index \"voidsec\" + ) -> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vmware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` :param page: set the page number of the response :type page: int @@ -299304,7 +299305,7 @@ async def index_voidsec_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_voidsec_get_serialize( + _param = self._index_vmware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299336,7 +299337,7 @@ async def index_voidsec_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -299352,7 +299353,7 @@ async def index_voidsec_get( @validate_call - async def index_voidsec_get_with_http_info( + async def index_vmware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299390,10 +299391,10 @@ async def index_voidsec_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination]: - """Return vulnerability data stored in index \"voidsec\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vmware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` :param page: set the page number of the response :type page: int @@ -299465,7 +299466,7 @@ async def index_voidsec_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_voidsec_get_serialize( + _param = self._index_vmware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299497,7 +299498,7 @@ async def index_voidsec_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -299513,7 +299514,7 @@ async def index_voidsec_get_with_http_info( @validate_call - async def index_voidsec_get_without_preload_content( + async def index_vmware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299552,9 +299553,9 @@ async def index_voidsec_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"voidsec\" + """Return vulnerability data stored in index \"vmware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` :param page: set the page number of the response :type page: int @@ -299626,7 +299627,7 @@ async def index_voidsec_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_voidsec_get_serialize( + _param = self._index_vmware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299658,7 +299659,7 @@ async def index_voidsec_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -299669,7 +299670,7 @@ async def index_voidsec_get_without_preload_content( return response_data.response - def _index_voidsec_get_serialize( + def _index_vmware_get_serialize( self, page, limit, @@ -299837,7 +299838,7 @@ def _index_voidsec_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/voidsec', + resource_path='/v3/index/vmware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -299854,7 +299855,7 @@ def _index_voidsec_get_serialize( @validate_call - async def index_vulncheck_canaries10d_get( + async def index_voidsec_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299863,10 +299864,16 @@ async def index_vulncheck_canaries10d_get( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -299886,10 +299893,10 @@ async def index_vulncheck_canaries10d_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + ) -> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination: + """Return vulnerability data stored in index \"voidsec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` :param page: set the page number of the response :type page: int @@ -299905,14 +299912,26 @@ async def index_vulncheck_canaries10d_get( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -299949,7 +299968,7 @@ async def index_vulncheck_canaries10d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries10d_get_serialize( + _param = self._index_voidsec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299957,10 +299976,16 @@ async def index_vulncheck_canaries10d_get( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -299975,7 +300000,7 @@ async def index_vulncheck_canaries10d_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", '404': "str", '500': "str", } @@ -299991,7 +300016,7 @@ async def index_vulncheck_canaries10d_get( @validate_call - async def index_vulncheck_canaries10d_get_with_http_info( + async def index_voidsec_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300000,10 +300025,16 @@ async def index_vulncheck_canaries10d_get_with_http_info( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -300023,10 +300054,10 @@ async def index_vulncheck_canaries10d_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination]: + """Return vulnerability data stored in index \"voidsec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` :param page: set the page number of the response :type page: int @@ -300042,14 +300073,26 @@ async def index_vulncheck_canaries10d_get_with_http_info( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -300086,7 +300129,7 @@ async def index_vulncheck_canaries10d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries10d_get_serialize( + _param = self._index_voidsec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300094,10 +300137,16 @@ async def index_vulncheck_canaries10d_get_with_http_info( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -300112,7 +300161,7 @@ async def index_vulncheck_canaries10d_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", '404': "str", '500': "str", } @@ -300128,7 +300177,7 @@ async def index_vulncheck_canaries10d_get_with_http_info( @validate_call - async def index_vulncheck_canaries10d_get_without_preload_content( + async def index_voidsec_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300137,10 +300186,16 @@ async def index_vulncheck_canaries10d_get_without_preload_content( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -300161,9 +300216,9 @@ async def index_vulncheck_canaries10d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + """Return vulnerability data stored in index \"voidsec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` :param page: set the page number of the response :type page: int @@ -300179,14 +300234,26 @@ async def index_vulncheck_canaries10d_get_without_preload_content( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -300223,7 +300290,7 @@ async def index_vulncheck_canaries10d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries10d_get_serialize( + _param = self._index_voidsec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300231,10 +300298,16 @@ async def index_vulncheck_canaries10d_get_without_preload_content( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -300249,7 +300322,7 @@ async def index_vulncheck_canaries10d_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", '404': "str", '500': "str", } @@ -300260,7 +300333,7 @@ async def index_vulncheck_canaries10d_get_without_preload_content( return response_data.response - def _index_vulncheck_canaries10d_get_serialize( + def _index_voidsec_get_serialize( self, page, limit, @@ -300269,10 +300342,16 @@ def _index_vulncheck_canaries10d_get_serialize( order, sort, cve, + alias, + iava, + jvndb, + ilvn, + threat_actor, + mitre_id, + misp_id, + ransomware, + botnet, published, - src_country, - dst_country, - src_ip, date, updated_at_start_date, updated_at_end_date, @@ -300333,21 +300412,45 @@ def _index_vulncheck_canaries10d_get_serialize( _query_params.append(('cve', cve)) - if published is not None: + if alias is not None: - _query_params.append(('published', published)) + _query_params.append(('alias', alias)) - if src_country is not None: + if iava is not None: - _query_params.append(('src_country', src_country)) + _query_params.append(('iava', iava)) - if dst_country is not None: + if jvndb is not None: - _query_params.append(('dst_country', dst_country)) + _query_params.append(('jvndb', jvndb)) - if src_ip is not None: + if ilvn is not None: - _query_params.append(('src_ip', src_ip)) + _query_params.append(('ilvn', ilvn)) + + if threat_actor is not None: + + _query_params.append(('threat_actor', threat_actor)) + + if mitre_id is not None: + + _query_params.append(('mitre_id', mitre_id)) + + if misp_id is not None: + + _query_params.append(('misp_id', misp_id)) + + if ransomware is not None: + + _query_params.append(('ransomware', ransomware)) + + if botnet is not None: + + _query_params.append(('botnet', botnet)) + + if published is not None: + + _query_params.append(('published', published)) if date is not None: @@ -300398,7 +300501,7 @@ def _index_vulncheck_canaries10d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-canaries-10d', + resource_path='/v3/index/voidsec', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -300415,7 +300518,7 @@ def _index_vulncheck_canaries10d_get_serialize( @validate_call - async def index_vulncheck_canaries30d_get( + async def index_vulncheck_canaries10d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300448,9 +300551,9 @@ async def index_vulncheck_canaries30d_get( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + """Return vulnerability data stored in index \"vulncheck-canaries-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` :param page: set the page number of the response :type page: int @@ -300510,7 +300613,7 @@ async def index_vulncheck_canaries30d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries30d_get_serialize( + _param = self._index_vulncheck_canaries10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300552,7 +300655,7 @@ async def index_vulncheck_canaries30d_get( @validate_call - async def index_vulncheck_canaries30d_get_with_http_info( + async def index_vulncheck_canaries10d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300585,9 +300688,9 @@ async def index_vulncheck_canaries30d_get_with_http_info( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + """Return vulnerability data stored in index \"vulncheck-canaries-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` :param page: set the page number of the response :type page: int @@ -300647,7 +300750,7 @@ async def index_vulncheck_canaries30d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries30d_get_serialize( + _param = self._index_vulncheck_canaries10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300689,7 +300792,7 @@ async def index_vulncheck_canaries30d_get_with_http_info( @validate_call - async def index_vulncheck_canaries30d_get_without_preload_content( + async def index_vulncheck_canaries10d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300722,9 +300825,9 @@ async def index_vulncheck_canaries30d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + """Return vulnerability data stored in index \"vulncheck-canaries-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` :param page: set the page number of the response :type page: int @@ -300784,7 +300887,7 @@ async def index_vulncheck_canaries30d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries30d_get_serialize( + _param = self._index_vulncheck_canaries10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300821,7 +300924,7 @@ async def index_vulncheck_canaries30d_get_without_preload_content( return response_data.response - def _index_vulncheck_canaries30d_get_serialize( + def _index_vulncheck_canaries10d_get_serialize( self, page, limit, @@ -300959,7 +301062,7 @@ def _index_vulncheck_canaries30d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-canaries-30d', + resource_path='/v3/index/vulncheck-canaries-10d', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -300976,7 +301079,7 @@ def _index_vulncheck_canaries30d_get_serialize( @validate_call - async def index_vulncheck_canaries3d_get( + async def index_vulncheck_canaries30d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -301009,9 +301112,9 @@ async def index_vulncheck_canaries3d_get( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + """Return vulnerability data stored in index \"vulncheck-canaries-30d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` :param page: set the page number of the response :type page: int @@ -301071,7 +301174,7 @@ async def index_vulncheck_canaries3d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries3d_get_serialize( + _param = self._index_vulncheck_canaries30d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -301113,7 +301216,7 @@ async def index_vulncheck_canaries3d_get( @validate_call - async def index_vulncheck_canaries3d_get_with_http_info( + async def index_vulncheck_canaries30d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -301146,9 +301249,9 @@ async def index_vulncheck_canaries3d_get_with_http_info( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + """Return vulnerability data stored in index \"vulncheck-canaries-30d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` :param page: set the page number of the response :type page: int @@ -301208,7 +301311,7 @@ async def index_vulncheck_canaries3d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries3d_get_serialize( + _param = self._index_vulncheck_canaries30d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -301250,7 +301353,568 @@ async def index_vulncheck_canaries3d_get_with_http_info( @validate_call - async def index_vulncheck_canaries3d_get_without_preload_content( + async def index_vulncheck_canaries30d_get_without_preload_content( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries30d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _index_vulncheck_canaries30d_get_serialize( + self, + page, + limit, + cursor, + start_cursor, + order, + sort, + cve, + published, + src_country, + dst_country, + src_ip, + date, + updated_at_start_date, + updated_at_end_date, + last_mod_start_date, + last_mod_end_date, + pub_start_date, + pub_end_date, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if order is not None: + + _query_params.append(('order', order)) + + if sort is not None: + + _query_params.append(('sort', sort)) + + if cve is not None: + + _query_params.append(('cve', cve)) + + if published is not None: + + _query_params.append(('published', published)) + + if src_country is not None: + + _query_params.append(('src_country', src_country)) + + if dst_country is not None: + + _query_params.append(('dst_country', dst_country)) + + if src_ip is not None: + + _query_params.append(('src_ip', src_ip)) + + if date is not None: + + _query_params.append(('date', date)) + + if updated_at_start_date is not None: + + _query_params.append(('updatedAtStartDate', updated_at_start_date)) + + if updated_at_end_date is not None: + + _query_params.append(('updatedAtEndDate', updated_at_end_date)) + + if last_mod_start_date is not None: + + _query_params.append(('lastModStartDate', last_mod_start_date)) + + if last_mod_end_date is not None: + + _query_params.append(('lastModEndDate', last_mod_end_date)) + + if pub_start_date is not None: + + _query_params.append(('pubStartDate', pub_start_date)) + + if pub_end_date is not None: + + _query_params.append(('pubEndDate', pub_end_date)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/v3/index/vulncheck-canaries-30d', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + async def index_vulncheck_canaries3d_get( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries3d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + async def index_vulncheck_canaries3d_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries3d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + async def index_vulncheck_canaries3d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -302330,7 +302994,610 @@ async def index_vulncheck_canaries_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries_get_serialize( + _param = self._index_vulncheck_canaries_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + async def index_vulncheck_canaries_get_without_preload_content( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """Return vulnerability data stored in index \"vulncheck-canaries\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _index_vulncheck_canaries_get_serialize( + self, + page, + limit, + cursor, + start_cursor, + order, + sort, + cve, + published, + src_country, + dst_country, + src_ip, + date, + updated_at_start_date, + updated_at_end_date, + last_mod_start_date, + last_mod_end_date, + pub_start_date, + pub_end_date, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if order is not None: + + _query_params.append(('order', order)) + + if sort is not None: + + _query_params.append(('sort', sort)) + + if cve is not None: + + _query_params.append(('cve', cve)) + + if published is not None: + + _query_params.append(('published', published)) + + if src_country is not None: + + _query_params.append(('src_country', src_country)) + + if dst_country is not None: + + _query_params.append(('dst_country', dst_country)) + + if src_ip is not None: + + _query_params.append(('src_ip', src_ip)) + + if date is not None: + + _query_params.append(('date', date)) + + if updated_at_start_date is not None: + + _query_params.append(('updatedAtStartDate', updated_at_start_date)) + + if updated_at_end_date is not None: + + _query_params.append(('updatedAtEndDate', updated_at_end_date)) + + if last_mod_start_date is not None: + + _query_params.append(('lastModStartDate', last_mod_start_date)) + + if last_mod_end_date is not None: + + _query_params.append(('lastModEndDate', last_mod_end_date)) + + if pub_start_date is not None: + + _query_params.append(('pubStartDate', pub_start_date)) + + if pub_end_date is not None: + + _query_params.append(('pubEndDate', pub_end_date)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/v3/index/vulncheck-canaries', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + async def index_vulncheck_config_get( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-config\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Configurations ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-config?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param published: Specify a published date + :type published: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_config_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + published=published, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + async def index_vulncheck_config_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-config\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Configurations ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-config?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param published: Specify a published date + :type published: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_config_get_serialize( page=page, limit=limit, cursor=cursor, @@ -302338,10 +303605,16 @@ async def index_vulncheck_canaries_get_with_http_info( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -302356,7 +303629,7 @@ async def index_vulncheck_canaries_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination", '404': "str", '500': "str", } @@ -302372,7 +303645,7 @@ async def index_vulncheck_canaries_get_with_http_info( @validate_call - async def index_vulncheck_canaries_get_without_preload_content( + async def index_vulncheck_config_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -302381,10 +303654,16 @@ async def index_vulncheck_canaries_get_without_preload_content( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -302405,9 +303684,9 @@ async def index_vulncheck_canaries_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-canaries\" + """Return vulnerability data stored in index \"vulncheck-config\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Configurations ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-config?cursor=` :param page: set the page number of the response :type page: int @@ -302423,14 +303702,26 @@ async def index_vulncheck_canaries_get_without_preload_content( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -302467,7 +303758,7 @@ async def index_vulncheck_canaries_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries_get_serialize( + _param = self._index_vulncheck_config_get_serialize( page=page, limit=limit, cursor=cursor, @@ -302475,10 +303766,16 @@ async def index_vulncheck_canaries_get_without_preload_content( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -302493,7 +303790,7 @@ async def index_vulncheck_canaries_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination", '404': "str", '500': "str", } @@ -302504,7 +303801,7 @@ async def index_vulncheck_canaries_get_without_preload_content( return response_data.response - def _index_vulncheck_canaries_get_serialize( + def _index_vulncheck_config_get_serialize( self, page, limit, @@ -302513,10 +303810,16 @@ def _index_vulncheck_canaries_get_serialize( order, sort, cve, + alias, + iava, + jvndb, + ilvn, + threat_actor, + mitre_id, + misp_id, + ransomware, + botnet, published, - src_country, - dst_country, - src_ip, date, updated_at_start_date, updated_at_end_date, @@ -302577,21 +303880,45 @@ def _index_vulncheck_canaries_get_serialize( _query_params.append(('cve', cve)) - if published is not None: + if alias is not None: - _query_params.append(('published', published)) + _query_params.append(('alias', alias)) - if src_country is not None: + if iava is not None: - _query_params.append(('src_country', src_country)) + _query_params.append(('iava', iava)) - if dst_country is not None: + if jvndb is not None: - _query_params.append(('dst_country', dst_country)) + _query_params.append(('jvndb', jvndb)) - if src_ip is not None: + if ilvn is not None: - _query_params.append(('src_ip', src_ip)) + _query_params.append(('ilvn', ilvn)) + + if threat_actor is not None: + + _query_params.append(('threat_actor', threat_actor)) + + if mitre_id is not None: + + _query_params.append(('mitre_id', mitre_id)) + + if misp_id is not None: + + _query_params.append(('misp_id', misp_id)) + + if ransomware is not None: + + _query_params.append(('ransomware', ransomware)) + + if botnet is not None: + + _query_params.append(('botnet', botnet)) + + if published is not None: + + _query_params.append(('published', published)) if date is not None: @@ -302642,7 +303969,7 @@ def _index_vulncheck_canaries_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-canaries', + resource_path='/v3/index/vulncheck-config', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -302659,7 +303986,7 @@ def _index_vulncheck_canaries_get_serialize( @validate_call - async def index_vulncheck_config_get( + async def index_vulncheck_cvelist_v5_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -302697,10 +304024,10 @@ async def index_vulncheck_config_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-config\" + ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination: + """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Configurations ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-config?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -302772,7 +304099,7 @@ async def index_vulncheck_config_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_config_get_serialize( + _param = self._index_vulncheck_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -302804,7 +304131,7 @@ async def index_vulncheck_config_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -302820,7 +304147,7 @@ async def index_vulncheck_config_get( @validate_call - async def index_vulncheck_config_get_with_http_info( + async def index_vulncheck_cvelist_v5_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -302858,10 +304185,10 @@ async def index_vulncheck_config_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-config\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Configurations ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-config?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -302933,7 +304260,7 @@ async def index_vulncheck_config_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_config_get_serialize( + _param = self._index_vulncheck_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -302965,7 +304292,7 @@ async def index_vulncheck_config_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -302981,7 +304308,7 @@ async def index_vulncheck_config_get_with_http_info( @validate_call - async def index_vulncheck_config_get_without_preload_content( + async def index_vulncheck_cvelist_v5_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -303020,9 +304347,9 @@ async def index_vulncheck_config_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-config\" + """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Configurations ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-config?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -303094,7 +304421,7 @@ async def index_vulncheck_config_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_config_get_serialize( + _param = self._index_vulncheck_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -303126,7 +304453,7 @@ async def index_vulncheck_config_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -303137,7 +304464,7 @@ async def index_vulncheck_config_get_without_preload_content( return response_data.response - def _index_vulncheck_config_get_serialize( + def _index_vulncheck_cvelist_v5_get_serialize( self, page, limit, @@ -303305,7 +304632,7 @@ def _index_vulncheck_config_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-config', + resource_path='/v3/index/vulncheck-cvelist-v5', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -303322,7 +304649,7 @@ def _index_vulncheck_config_get_serialize( @validate_call - async def index_vulncheck_cvelist_v5_get( + async def index_vulncheck_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -303360,10 +304687,10 @@ async def index_vulncheck_cvelist_v5_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination: - """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" + ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination: + """Return vulnerability data stored in index \"vulncheck\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck?cursor=` :param page: set the page number of the response :type page: int @@ -303435,7 +304762,7 @@ async def index_vulncheck_cvelist_v5_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_cvelist_v5_get_serialize( + _param = self._index_vulncheck_get_serialize( page=page, limit=limit, cursor=cursor, @@ -303467,7 +304794,7 @@ async def index_vulncheck_cvelist_v5_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination", '404': "str", '500': "str", } @@ -303483,7 +304810,7 @@ async def index_vulncheck_cvelist_v5_get( @validate_call - async def index_vulncheck_cvelist_v5_get_with_http_info( + async def index_vulncheck_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -303521,10 +304848,10 @@ async def index_vulncheck_cvelist_v5_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck?cursor=` :param page: set the page number of the response :type page: int @@ -303596,7 +304923,7 @@ async def index_vulncheck_cvelist_v5_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_cvelist_v5_get_serialize( + _param = self._index_vulncheck_get_serialize( page=page, limit=limit, cursor=cursor, @@ -303628,7 +304955,7 @@ async def index_vulncheck_cvelist_v5_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination", '404': "str", '500': "str", } @@ -303644,7 +304971,7 @@ async def index_vulncheck_cvelist_v5_get_with_http_info( @validate_call - async def index_vulncheck_cvelist_v5_get_without_preload_content( + async def index_vulncheck_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -303683,9 +305010,9 @@ async def index_vulncheck_cvelist_v5_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" + """Return vulnerability data stored in index \"vulncheck\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck?cursor=` :param page: set the page number of the response :type page: int @@ -303757,7 +305084,7 @@ async def index_vulncheck_cvelist_v5_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_cvelist_v5_get_serialize( + _param = self._index_vulncheck_get_serialize( page=page, limit=limit, cursor=cursor, @@ -303789,7 +305116,7 @@ async def index_vulncheck_cvelist_v5_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination", '404': "str", '500': "str", } @@ -303800,7 +305127,7 @@ async def index_vulncheck_cvelist_v5_get_without_preload_content( return response_data.response - def _index_vulncheck_cvelist_v5_get_serialize( + def _index_vulncheck_get_serialize( self, page, limit, @@ -303968,7 +305295,7 @@ def _index_vulncheck_cvelist_v5_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-cvelist-v5', + resource_path='/v3/index/vulncheck', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -303985,7 +305312,7 @@ def _index_vulncheck_cvelist_v5_get_serialize( @validate_call - async def index_vulncheck_get( + async def index_vulncheck_kev_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -304023,10 +305350,10 @@ async def index_vulncheck_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination: - """Return vulnerability data stored in index \"vulncheck\" + ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-kev\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck KEV ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-kev?cursor=` :param page: set the page number of the response :type page: int @@ -304098,7 +305425,7 @@ async def index_vulncheck_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_get_serialize( + _param = self._index_vulncheck_kev_get_serialize( page=page, limit=limit, cursor=cursor, @@ -304130,7 +305457,7 @@ async def index_vulncheck_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination", '404': "str", '500': "str", } @@ -304146,7 +305473,7 @@ async def index_vulncheck_get( @validate_call - async def index_vulncheck_get_with_http_info( + async def index_vulncheck_kev_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -304184,10 +305511,10 @@ async def index_vulncheck_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-kev\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck KEV ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-kev?cursor=` :param page: set the page number of the response :type page: int @@ -304259,7 +305586,7 @@ async def index_vulncheck_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_get_serialize( + _param = self._index_vulncheck_kev_get_serialize( page=page, limit=limit, cursor=cursor, @@ -304291,7 +305618,7 @@ async def index_vulncheck_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination", '404': "str", '500': "str", } @@ -304307,7 +305634,7 @@ async def index_vulncheck_get_with_http_info( @validate_call - async def index_vulncheck_get_without_preload_content( + async def index_vulncheck_kev_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -304346,9 +305673,9 @@ async def index_vulncheck_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck\" + """Return vulnerability data stored in index \"vulncheck-kev\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck KEV ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-kev?cursor=` :param page: set the page number of the response :type page: int @@ -304420,7 +305747,7 @@ async def index_vulncheck_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_get_serialize( + _param = self._index_vulncheck_kev_get_serialize( page=page, limit=limit, cursor=cursor, @@ -304452,7 +305779,7 @@ async def index_vulncheck_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination", '404': "str", '500': "str", } @@ -304463,7 +305790,7 @@ async def index_vulncheck_get_without_preload_content( return response_data.response - def _index_vulncheck_get_serialize( + def _index_vulncheck_kev_get_serialize( self, page, limit, @@ -304631,7 +305958,7 @@ def _index_vulncheck_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck', + resource_path='/v3/index/vulncheck-kev', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -304648,7 +305975,7 @@ def _index_vulncheck_get_serialize( @validate_call - async def index_vulncheck_kev_get( + async def index_vulncheck_nvd2_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -304686,10 +306013,10 @@ async def index_vulncheck_kev_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-kev\" + ) -> RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck KEV ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-kev?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD V2 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -304761,7 +306088,7 @@ async def index_vulncheck_kev_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_kev_get_serialize( + _param = self._index_vulncheck_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -304793,7 +306120,7 @@ async def index_vulncheck_kev_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination", '404': "str", '500': "str", } @@ -304809,7 +306136,7 @@ async def index_vulncheck_kev_get( @validate_call - async def index_vulncheck_kev_get_with_http_info( + async def index_vulncheck_nvd2_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -304847,10 +306174,10 @@ async def index_vulncheck_kev_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-kev\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck KEV ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-kev?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD V2 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -304922,7 +306249,7 @@ async def index_vulncheck_kev_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_kev_get_serialize( + _param = self._index_vulncheck_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -304954,7 +306281,7 @@ async def index_vulncheck_kev_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination", '404': "str", '500': "str", } @@ -304970,7 +306297,7 @@ async def index_vulncheck_kev_get_with_http_info( @validate_call - async def index_vulncheck_kev_get_without_preload_content( + async def index_vulncheck_nvd2_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -305009,9 +306336,9 @@ async def index_vulncheck_kev_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-kev\" + """Return vulnerability data stored in index \"vulncheck-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck KEV ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-kev?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD V2 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -305083,7 +306410,7 @@ async def index_vulncheck_kev_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_kev_get_serialize( + _param = self._index_vulncheck_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -305115,7 +306442,7 @@ async def index_vulncheck_kev_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination", '404': "str", '500': "str", } @@ -305126,7 +306453,7 @@ async def index_vulncheck_kev_get_without_preload_content( return response_data.response - def _index_vulncheck_kev_get_serialize( + def _index_vulncheck_nvd2_get_serialize( self, page, limit, @@ -305294,7 +306621,7 @@ def _index_vulncheck_kev_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-kev', + resource_path='/v3/index/vulncheck-nvd2', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -305311,7 +306638,7 @@ def _index_vulncheck_kev_get_serialize( @validate_call - async def index_vulncheck_nvd2_get( + async def index_vulncheck_nvd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -305349,10 +306676,10 @@ async def index_vulncheck_nvd2_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-nvd2\" + ) -> RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD V2 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -305424,7 +306751,7 @@ async def index_vulncheck_nvd2_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_nvd2_get_serialize( + _param = self._index_vulncheck_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -305456,7 +306783,7 @@ async def index_vulncheck_nvd2_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination", '404': "str", '500': "str", } @@ -305472,7 +306799,7 @@ async def index_vulncheck_nvd2_get( @validate_call - async def index_vulncheck_nvd2_get_with_http_info( + async def index_vulncheck_nvd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -305510,10 +306837,10 @@ async def index_vulncheck_nvd2_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-nvd2\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD V2 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -305585,7 +306912,7 @@ async def index_vulncheck_nvd2_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_nvd2_get_serialize( + _param = self._index_vulncheck_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -305617,7 +306944,7 @@ async def index_vulncheck_nvd2_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination", '404': "str", '500': "str", } @@ -305633,7 +306960,7 @@ async def index_vulncheck_nvd2_get_with_http_info( @validate_call - async def index_vulncheck_nvd2_get_without_preload_content( + async def index_vulncheck_nvd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -305672,9 +306999,9 @@ async def index_vulncheck_nvd2_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-nvd2\" + """Return vulnerability data stored in index \"vulncheck-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD V2 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -305746,7 +307073,7 @@ async def index_vulncheck_nvd2_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_nvd2_get_serialize( + _param = self._index_vulncheck_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -305778,7 +307105,7 @@ async def index_vulncheck_nvd2_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination", '404': "str", '500': "str", } @@ -305789,7 +307116,7 @@ async def index_vulncheck_nvd2_get_without_preload_content( return response_data.response - def _index_vulncheck_nvd2_get_serialize( + def _index_vulncheck_nvd_get_serialize( self, page, limit, @@ -305957,7 +307284,7 @@ def _index_vulncheck_nvd2_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-nvd2', + resource_path='/v3/index/vulncheck-nvd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -305974,7 +307301,7 @@ def _index_vulncheck_nvd2_get_serialize( @validate_call - async def index_vulncheck_nvd_get( + async def index_vulnerability_aliases_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -306012,10 +307339,10 @@ async def index_vulncheck_nvd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-nvd\" + ) -> RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination: + """Return vulnerability data stored in index \"vulnerability-aliases\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vulnerability Aliases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnerability-aliases?cursor=` :param page: set the page number of the response :type page: int @@ -306087,7 +307414,7 @@ async def index_vulncheck_nvd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_nvd_get_serialize( + _param = self._index_vulnerability_aliases_get_serialize( page=page, limit=limit, cursor=cursor, @@ -306119,7 +307446,7 @@ async def index_vulncheck_nvd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination", '404': "str", '500': "str", } @@ -306135,7 +307462,7 @@ async def index_vulncheck_nvd_get( @validate_call - async def index_vulncheck_nvd_get_with_http_info( + async def index_vulnerability_aliases_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -306173,10 +307500,10 @@ async def index_vulncheck_nvd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-nvd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination]: + """Return vulnerability data stored in index \"vulnerability-aliases\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vulnerability Aliases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnerability-aliases?cursor=` :param page: set the page number of the response :type page: int @@ -306248,7 +307575,7 @@ async def index_vulncheck_nvd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_nvd_get_serialize( + _param = self._index_vulnerability_aliases_get_serialize( page=page, limit=limit, cursor=cursor, @@ -306280,7 +307607,7 @@ async def index_vulncheck_nvd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination", '404': "str", '500': "str", } @@ -306296,7 +307623,7 @@ async def index_vulncheck_nvd_get_with_http_info( @validate_call - async def index_vulncheck_nvd_get_without_preload_content( + async def index_vulnerability_aliases_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -306335,9 +307662,9 @@ async def index_vulncheck_nvd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-nvd\" + """Return vulnerability data stored in index \"vulnerability-aliases\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vulnerability Aliases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnerability-aliases?cursor=` :param page: set the page number of the response :type page: int @@ -306409,7 +307736,7 @@ async def index_vulncheck_nvd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_nvd_get_serialize( + _param = self._index_vulnerability_aliases_get_serialize( page=page, limit=limit, cursor=cursor, @@ -306441,7 +307768,7 @@ async def index_vulncheck_nvd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination", '404': "str", '500': "str", } @@ -306452,7 +307779,7 @@ async def index_vulncheck_nvd_get_without_preload_content( return response_data.response - def _index_vulncheck_nvd_get_serialize( + def _index_vulnerability_aliases_get_serialize( self, page, limit, @@ -306620,7 +307947,7 @@ def _index_vulncheck_nvd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-nvd', + resource_path='/v3/index/vulnerability-aliases', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -306637,7 +307964,7 @@ def _index_vulncheck_nvd_get_serialize( @validate_call - async def index_vulnerability_aliases_get( + async def index_vulnrichment_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -306675,10 +308002,10 @@ async def index_vulnerability_aliases_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination: - """Return vulnerability data stored in index \"vulnerability-aliases\" + ) -> RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination: + """Return vulnerability data stored in index \"vulnrichment\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vulnerability Aliases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnerability-aliases?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CISA Vulnrichment ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnrichment?cursor=` :param page: set the page number of the response :type page: int @@ -306750,7 +308077,7 @@ async def index_vulnerability_aliases_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulnerability_aliases_get_serialize( + _param = self._index_vulnrichment_get_serialize( page=page, limit=limit, cursor=cursor, @@ -306782,7 +308109,7 @@ async def index_vulnerability_aliases_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination", '404': "str", '500': "str", } @@ -306798,7 +308125,7 @@ async def index_vulnerability_aliases_get( @validate_call - async def index_vulnerability_aliases_get_with_http_info( + async def index_vulnrichment_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -306836,10 +308163,10 @@ async def index_vulnerability_aliases_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination]: - """Return vulnerability data stored in index \"vulnerability-aliases\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination]: + """Return vulnerability data stored in index \"vulnrichment\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vulnerability Aliases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnerability-aliases?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CISA Vulnrichment ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnrichment?cursor=` :param page: set the page number of the response :type page: int @@ -306911,7 +308238,7 @@ async def index_vulnerability_aliases_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulnerability_aliases_get_serialize( + _param = self._index_vulnrichment_get_serialize( page=page, limit=limit, cursor=cursor, @@ -306943,7 +308270,7 @@ async def index_vulnerability_aliases_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination", '404': "str", '500': "str", } @@ -306959,7 +308286,7 @@ async def index_vulnerability_aliases_get_with_http_info( @validate_call - async def index_vulnerability_aliases_get_without_preload_content( + async def index_vulnrichment_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -306998,9 +308325,9 @@ async def index_vulnerability_aliases_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulnerability-aliases\" + """Return vulnerability data stored in index \"vulnrichment\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vulnerability Aliases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnerability-aliases?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CISA Vulnrichment ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnrichment?cursor=` :param page: set the page number of the response :type page: int @@ -307072,7 +308399,7 @@ async def index_vulnerability_aliases_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulnerability_aliases_get_serialize( + _param = self._index_vulnrichment_get_serialize( page=page, limit=limit, cursor=cursor, @@ -307104,7 +308431,7 @@ async def index_vulnerability_aliases_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination", '404': "str", '500': "str", } @@ -307115,7 +308442,7 @@ async def index_vulnerability_aliases_get_without_preload_content( return response_data.response - def _index_vulnerability_aliases_get_serialize( + def _index_vulnrichment_get_serialize( self, page, limit, @@ -307283,7 +308610,7 @@ def _index_vulnerability_aliases_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulnerability-aliases', + resource_path='/v3/index/vulnrichment', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -307300,7 +308627,7 @@ def _index_vulnerability_aliases_get_serialize( @validate_call - async def index_vulnrichment_get( + async def index_vyaire_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -307338,10 +308665,10 @@ async def index_vulnrichment_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination: - """Return vulnerability data stored in index \"vulnrichment\" + ) -> RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vyaire\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CISA Vulnrichment ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnrichment?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vyaire Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vyaire?cursor=` :param page: set the page number of the response :type page: int @@ -307413,7 +308740,7 @@ async def index_vulnrichment_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulnrichment_get_serialize( + _param = self._index_vyaire_get_serialize( page=page, limit=limit, cursor=cursor, @@ -307445,7 +308772,7 @@ async def index_vulnrichment_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -307461,7 +308788,7 @@ async def index_vulnrichment_get( @validate_call - async def index_vulnrichment_get_with_http_info( + async def index_vyaire_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -307499,10 +308826,10 @@ async def index_vulnrichment_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination]: - """Return vulnerability data stored in index \"vulnrichment\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vyaire\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CISA Vulnrichment ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnrichment?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vyaire Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vyaire?cursor=` :param page: set the page number of the response :type page: int @@ -307574,7 +308901,7 @@ async def index_vulnrichment_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulnrichment_get_serialize( + _param = self._index_vyaire_get_serialize( page=page, limit=limit, cursor=cursor, @@ -307606,7 +308933,7 @@ async def index_vulnrichment_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -307622,7 +308949,7 @@ async def index_vulnrichment_get_with_http_info( @validate_call - async def index_vulnrichment_get_without_preload_content( + async def index_vyaire_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -307661,9 +308988,9 @@ async def index_vulnrichment_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulnrichment\" + """Return vulnerability data stored in index \"vyaire\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CISA Vulnrichment ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnrichment?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vyaire Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vyaire?cursor=` :param page: set the page number of the response :type page: int @@ -307735,7 +309062,7 @@ async def index_vulnrichment_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulnrichment_get_serialize( + _param = self._index_vyaire_get_serialize( page=page, limit=limit, cursor=cursor, @@ -307767,7 +309094,7 @@ async def index_vulnrichment_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -307778,7 +309105,7 @@ async def index_vulnrichment_get_without_preload_content( return response_data.response - def _index_vulnrichment_get_serialize( + def _index_vyaire_get_serialize( self, page, limit, @@ -307946,7 +309273,7 @@ def _index_vulnrichment_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulnrichment', + resource_path='/v3/index/vyaire', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -307963,7 +309290,7 @@ def _index_vulnrichment_get_serialize( @validate_call - async def index_vyaire_get( + async def index_watchguard_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -308001,10 +309328,10 @@ async def index_vyaire_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vyaire\" + ) -> RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination: + """Return vulnerability data stored in index \"watchguard\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vyaire Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vyaire?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Watchguard Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/watchguard?cursor=` :param page: set the page number of the response :type page: int @@ -308076,7 +309403,7 @@ async def index_vyaire_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vyaire_get_serialize( + _param = self._index_watchguard_get_serialize( page=page, limit=limit, cursor=cursor, @@ -308108,7 +309435,7 @@ async def index_vyaire_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination", '404': "str", '500': "str", } @@ -308124,7 +309451,7 @@ async def index_vyaire_get( @validate_call - async def index_vyaire_get_with_http_info( + async def index_watchguard_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -308162,10 +309489,10 @@ async def index_vyaire_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vyaire\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination]: + """Return vulnerability data stored in index \"watchguard\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vyaire Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vyaire?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Watchguard Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/watchguard?cursor=` :param page: set the page number of the response :type page: int @@ -308237,7 +309564,7 @@ async def index_vyaire_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vyaire_get_serialize( + _param = self._index_watchguard_get_serialize( page=page, limit=limit, cursor=cursor, @@ -308269,7 +309596,7 @@ async def index_vyaire_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination", '404': "str", '500': "str", } @@ -308285,7 +309612,7 @@ async def index_vyaire_get_with_http_info( @validate_call - async def index_vyaire_get_without_preload_content( + async def index_watchguard_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -308324,9 +309651,9 @@ async def index_vyaire_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vyaire\" + """Return vulnerability data stored in index \"watchguard\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vyaire Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vyaire?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Watchguard Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/watchguard?cursor=` :param page: set the page number of the response :type page: int @@ -308398,7 +309725,7 @@ async def index_vyaire_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vyaire_get_serialize( + _param = self._index_watchguard_get_serialize( page=page, limit=limit, cursor=cursor, @@ -308430,7 +309757,7 @@ async def index_vyaire_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination", '404': "str", '500': "str", } @@ -308441,7 +309768,7 @@ async def index_vyaire_get_without_preload_content( return response_data.response - def _index_vyaire_get_serialize( + def _index_watchguard_get_serialize( self, page, limit, @@ -308609,7 +309936,7 @@ def _index_vyaire_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vyaire', + resource_path='/v3/index/watchguard', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -308626,7 +309953,7 @@ def _index_vyaire_get_serialize( @validate_call - async def index_watchguard_get( + async def index_whatsapp_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -308664,10 +309991,10 @@ async def index_watchguard_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination: - """Return vulnerability data stored in index \"watchguard\" + ) -> RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination: + """Return vulnerability data stored in index \"whatsapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Watchguard Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/watchguard?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WhatsApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/whatsapp?cursor=` :param page: set the page number of the response :type page: int @@ -308739,7 +310066,7 @@ async def index_watchguard_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_watchguard_get_serialize( + _param = self._index_whatsapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -308771,7 +310098,7 @@ async def index_watchguard_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination", '404': "str", '500': "str", } @@ -308787,7 +310114,7 @@ async def index_watchguard_get( @validate_call - async def index_watchguard_get_with_http_info( + async def index_whatsapp_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -308825,10 +310152,10 @@ async def index_watchguard_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination]: - """Return vulnerability data stored in index \"watchguard\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination]: + """Return vulnerability data stored in index \"whatsapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Watchguard Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/watchguard?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WhatsApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/whatsapp?cursor=` :param page: set the page number of the response :type page: int @@ -308900,7 +310227,7 @@ async def index_watchguard_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_watchguard_get_serialize( + _param = self._index_whatsapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -308932,7 +310259,7 @@ async def index_watchguard_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination", '404': "str", '500': "str", } @@ -308948,7 +310275,7 @@ async def index_watchguard_get_with_http_info( @validate_call - async def index_watchguard_get_without_preload_content( + async def index_whatsapp_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -308987,9 +310314,9 @@ async def index_watchguard_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"watchguard\" + """Return vulnerability data stored in index \"whatsapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Watchguard Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/watchguard?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WhatsApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/whatsapp?cursor=` :param page: set the page number of the response :type page: int @@ -309061,7 +310388,7 @@ async def index_watchguard_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_watchguard_get_serialize( + _param = self._index_whatsapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -309093,7 +310420,7 @@ async def index_watchguard_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination", '404': "str", '500': "str", } @@ -309104,7 +310431,7 @@ async def index_watchguard_get_without_preload_content( return response_data.response - def _index_watchguard_get_serialize( + def _index_whatsapp_get_serialize( self, page, limit, @@ -309272,7 +310599,7 @@ def _index_watchguard_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/watchguard', + resource_path='/v3/index/whatsapp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -309289,7 +310616,7 @@ def _index_watchguard_get_serialize( @validate_call - async def index_whatsapp_get( + async def index_wibu_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -309327,10 +310654,10 @@ async def index_whatsapp_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination: - """Return vulnerability data stored in index \"whatsapp\" + ) -> RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination: + """Return vulnerability data stored in index \"wibu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WhatsApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/whatsapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wibu Systems Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wibu?cursor=` :param page: set the page number of the response :type page: int @@ -309402,7 +310729,7 @@ async def index_whatsapp_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_whatsapp_get_serialize( + _param = self._index_wibu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -309434,7 +310761,7 @@ async def index_whatsapp_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination", '404': "str", '500': "str", } @@ -309450,7 +310777,7 @@ async def index_whatsapp_get( @validate_call - async def index_whatsapp_get_with_http_info( + async def index_wibu_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -309488,10 +310815,10 @@ async def index_whatsapp_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination]: - """Return vulnerability data stored in index \"whatsapp\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination]: + """Return vulnerability data stored in index \"wibu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WhatsApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/whatsapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wibu Systems Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wibu?cursor=` :param page: set the page number of the response :type page: int @@ -309563,7 +310890,7 @@ async def index_whatsapp_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_whatsapp_get_serialize( + _param = self._index_wibu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -309595,7 +310922,7 @@ async def index_whatsapp_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination", '404': "str", '500': "str", } @@ -309611,7 +310938,7 @@ async def index_whatsapp_get_with_http_info( @validate_call - async def index_whatsapp_get_without_preload_content( + async def index_wibu_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -309650,9 +310977,9 @@ async def index_whatsapp_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"whatsapp\" + """Return vulnerability data stored in index \"wibu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WhatsApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/whatsapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wibu Systems Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wibu?cursor=` :param page: set the page number of the response :type page: int @@ -309724,7 +311051,7 @@ async def index_whatsapp_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_whatsapp_get_serialize( + _param = self._index_wibu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -309756,7 +311083,7 @@ async def index_whatsapp_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination", '404': "str", '500': "str", } @@ -309767,7 +311094,7 @@ async def index_whatsapp_get_without_preload_content( return response_data.response - def _index_whatsapp_get_serialize( + def _index_wibu_get_serialize( self, page, limit, @@ -309935,7 +311262,7 @@ def _index_whatsapp_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/whatsapp', + resource_path='/v3/index/wibu', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -309952,7 +311279,7 @@ def _index_whatsapp_get_serialize( @validate_call - async def index_wibu_get( + async def index_wireshark_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -309990,10 +311317,10 @@ async def index_wibu_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination: - """Return vulnerability data stored in index \"wibu\" + ) -> RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination: + """Return vulnerability data stored in index \"wireshark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wibu Systems Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wibu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wireshark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wireshark?cursor=` :param page: set the page number of the response :type page: int @@ -310065,7 +311392,7 @@ async def index_wibu_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wibu_get_serialize( + _param = self._index_wireshark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -310097,7 +311424,7 @@ async def index_wibu_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination", '404': "str", '500': "str", } @@ -310113,7 +311440,7 @@ async def index_wibu_get( @validate_call - async def index_wibu_get_with_http_info( + async def index_wireshark_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -310151,10 +311478,10 @@ async def index_wibu_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination]: - """Return vulnerability data stored in index \"wibu\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination]: + """Return vulnerability data stored in index \"wireshark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wibu Systems Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wibu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wireshark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wireshark?cursor=` :param page: set the page number of the response :type page: int @@ -310226,7 +311553,7 @@ async def index_wibu_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wibu_get_serialize( + _param = self._index_wireshark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -310258,7 +311585,7 @@ async def index_wibu_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination", '404': "str", '500': "str", } @@ -310274,7 +311601,7 @@ async def index_wibu_get_with_http_info( @validate_call - async def index_wibu_get_without_preload_content( + async def index_wireshark_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -310313,9 +311640,9 @@ async def index_wibu_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"wibu\" + """Return vulnerability data stored in index \"wireshark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wibu Systems Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wibu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wireshark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wireshark?cursor=` :param page: set the page number of the response :type page: int @@ -310387,7 +311714,7 @@ async def index_wibu_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wibu_get_serialize( + _param = self._index_wireshark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -310419,7 +311746,7 @@ async def index_wibu_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination", '404': "str", '500': "str", } @@ -310430,7 +311757,7 @@ async def index_wibu_get_without_preload_content( return response_data.response - def _index_wibu_get_serialize( + def _index_wireshark_get_serialize( self, page, limit, @@ -310598,7 +311925,7 @@ def _index_wibu_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/wibu', + resource_path='/v3/index/wireshark', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -310615,7 +311942,7 @@ def _index_wibu_get_serialize( @validate_call - async def index_wireshark_get( + async def index_with_secure_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -310653,10 +311980,10 @@ async def index_wireshark_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination: - """Return vulnerability data stored in index \"wireshark\" + ) -> RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination: + """Return vulnerability data stored in index \"with-secure\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wireshark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wireshark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** With Secure Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/with-secure?cursor=` :param page: set the page number of the response :type page: int @@ -310728,7 +312055,7 @@ async def index_wireshark_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wireshark_get_serialize( + _param = self._index_with_secure_get_serialize( page=page, limit=limit, cursor=cursor, @@ -310760,7 +312087,7 @@ async def index_wireshark_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination", '404': "str", '500': "str", } @@ -310776,7 +312103,7 @@ async def index_wireshark_get( @validate_call - async def index_wireshark_get_with_http_info( + async def index_with_secure_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -310814,10 +312141,10 @@ async def index_wireshark_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination]: - """Return vulnerability data stored in index \"wireshark\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination]: + """Return vulnerability data stored in index \"with-secure\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wireshark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wireshark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** With Secure Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/with-secure?cursor=` :param page: set the page number of the response :type page: int @@ -310889,7 +312216,7 @@ async def index_wireshark_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wireshark_get_serialize( + _param = self._index_with_secure_get_serialize( page=page, limit=limit, cursor=cursor, @@ -310921,7 +312248,7 @@ async def index_wireshark_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination", '404': "str", '500': "str", } @@ -310937,7 +312264,7 @@ async def index_wireshark_get_with_http_info( @validate_call - async def index_wireshark_get_without_preload_content( + async def index_with_secure_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -310976,9 +312303,9 @@ async def index_wireshark_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"wireshark\" + """Return vulnerability data stored in index \"with-secure\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wireshark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wireshark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** With Secure Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/with-secure?cursor=` :param page: set the page number of the response :type page: int @@ -311050,7 +312377,7 @@ async def index_wireshark_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wireshark_get_serialize( + _param = self._index_with_secure_get_serialize( page=page, limit=limit, cursor=cursor, @@ -311082,7 +312409,7 @@ async def index_wireshark_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination", '404': "str", '500': "str", } @@ -311093,7 +312420,7 @@ async def index_wireshark_get_without_preload_content( return response_data.response - def _index_wireshark_get_serialize( + def _index_with_secure_get_serialize( self, page, limit, @@ -311261,7 +312588,7 @@ def _index_wireshark_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/wireshark', + resource_path='/v3/index/with-secure', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -311278,7 +312605,7 @@ def _index_wireshark_get_serialize( @validate_call - async def index_with_secure_get( + async def index_wolfi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -311316,10 +312643,10 @@ async def index_with_secure_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination: - """Return vulnerability data stored in index \"with-secure\" + ) -> RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination: + """Return vulnerability data stored in index \"wolfi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** With Secure Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/with-secure?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wolfi Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfi?cursor=` :param page: set the page number of the response :type page: int @@ -311391,7 +312718,7 @@ async def index_with_secure_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_with_secure_get_serialize( + _param = self._index_wolfi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -311423,7 +312750,7 @@ async def index_with_secure_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination", '404': "str", '500': "str", } @@ -311439,7 +312766,7 @@ async def index_with_secure_get( @validate_call - async def index_with_secure_get_with_http_info( + async def index_wolfi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -311477,10 +312804,10 @@ async def index_with_secure_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination]: - """Return vulnerability data stored in index \"with-secure\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination]: + """Return vulnerability data stored in index \"wolfi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** With Secure Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/with-secure?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wolfi Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfi?cursor=` :param page: set the page number of the response :type page: int @@ -311552,7 +312879,7 @@ async def index_with_secure_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_with_secure_get_serialize( + _param = self._index_wolfi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -311584,7 +312911,7 @@ async def index_with_secure_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination", '404': "str", '500': "str", } @@ -311600,7 +312927,7 @@ async def index_with_secure_get_with_http_info( @validate_call - async def index_with_secure_get_without_preload_content( + async def index_wolfi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -311639,9 +312966,9 @@ async def index_with_secure_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"with-secure\" + """Return vulnerability data stored in index \"wolfi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** With Secure Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/with-secure?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wolfi Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfi?cursor=` :param page: set the page number of the response :type page: int @@ -311713,7 +313040,7 @@ async def index_with_secure_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_with_secure_get_serialize( + _param = self._index_wolfi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -311745,7 +313072,7 @@ async def index_with_secure_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination", '404': "str", '500': "str", } @@ -311756,7 +313083,7 @@ async def index_with_secure_get_without_preload_content( return response_data.response - def _index_with_secure_get_serialize( + def _index_wolfi_get_serialize( self, page, limit, @@ -311924,7 +313251,7 @@ def _index_with_secure_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/with-secure', + resource_path='/v3/index/wolfi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -311941,7 +313268,7 @@ def _index_with_secure_get_serialize( @validate_call - async def index_wolfi_get( + async def index_wolfssl_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -311979,10 +313306,10 @@ async def index_wolfi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination: - """Return vulnerability data stored in index \"wolfi\" + ) -> RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination: + """Return vulnerability data stored in index \"wolfssl\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wolfi Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WolfSSL Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfssl?cursor=` :param page: set the page number of the response :type page: int @@ -312054,7 +313381,7 @@ async def index_wolfi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wolfi_get_serialize( + _param = self._index_wolfssl_get_serialize( page=page, limit=limit, cursor=cursor, @@ -312086,7 +313413,7 @@ async def index_wolfi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination", '404': "str", '500': "str", } @@ -312102,7 +313429,7 @@ async def index_wolfi_get( @validate_call - async def index_wolfi_get_with_http_info( + async def index_wolfssl_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -312140,10 +313467,10 @@ async def index_wolfi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination]: - """Return vulnerability data stored in index \"wolfi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination]: + """Return vulnerability data stored in index \"wolfssl\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wolfi Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WolfSSL Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfssl?cursor=` :param page: set the page number of the response :type page: int @@ -312215,7 +313542,7 @@ async def index_wolfi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wolfi_get_serialize( + _param = self._index_wolfssl_get_serialize( page=page, limit=limit, cursor=cursor, @@ -312247,7 +313574,7 @@ async def index_wolfi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination", '404': "str", '500': "str", } @@ -312263,7 +313590,7 @@ async def index_wolfi_get_with_http_info( @validate_call - async def index_wolfi_get_without_preload_content( + async def index_wolfssl_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -312302,9 +313629,9 @@ async def index_wolfi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"wolfi\" + """Return vulnerability data stored in index \"wolfssl\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wolfi Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WolfSSL Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfssl?cursor=` :param page: set the page number of the response :type page: int @@ -312376,7 +313703,7 @@ async def index_wolfi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wolfi_get_serialize( + _param = self._index_wolfssl_get_serialize( page=page, limit=limit, cursor=cursor, @@ -312408,7 +313735,7 @@ async def index_wolfi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination", '404': "str", '500': "str", } @@ -312419,7 +313746,7 @@ async def index_wolfi_get_without_preload_content( return response_data.response - def _index_wolfi_get_serialize( + def _index_wolfssl_get_serialize( self, page, limit, @@ -312587,7 +313914,7 @@ def _index_wolfi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/wolfi', + resource_path='/v3/index/wolfssl', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -312604,7 +313931,7 @@ def _index_wolfi_get_serialize( @validate_call - async def index_wolfssl_get( + async def index_wordfence_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -312642,10 +313969,10 @@ async def index_wolfssl_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination: - """Return vulnerability data stored in index \"wolfssl\" + ) -> RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination: + """Return vulnerability data stored in index \"wordfence\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WolfSSL Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfssl?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wordfence Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wordfence?cursor=` :param page: set the page number of the response :type page: int @@ -312717,7 +314044,7 @@ async def index_wolfssl_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wolfssl_get_serialize( + _param = self._index_wordfence_get_serialize( page=page, limit=limit, cursor=cursor, @@ -312749,7 +314076,7 @@ async def index_wolfssl_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination", '404': "str", '500': "str", } @@ -312765,7 +314092,7 @@ async def index_wolfssl_get( @validate_call - async def index_wolfssl_get_with_http_info( + async def index_wordfence_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -312803,10 +314130,10 @@ async def index_wolfssl_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination]: - """Return vulnerability data stored in index \"wolfssl\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination]: + """Return vulnerability data stored in index \"wordfence\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WolfSSL Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfssl?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wordfence Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wordfence?cursor=` :param page: set the page number of the response :type page: int @@ -312878,7 +314205,7 @@ async def index_wolfssl_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wolfssl_get_serialize( + _param = self._index_wordfence_get_serialize( page=page, limit=limit, cursor=cursor, @@ -312910,7 +314237,7 @@ async def index_wolfssl_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination", '404': "str", '500': "str", } @@ -312926,7 +314253,7 @@ async def index_wolfssl_get_with_http_info( @validate_call - async def index_wolfssl_get_without_preload_content( + async def index_wordfence_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -312965,9 +314292,9 @@ async def index_wolfssl_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"wolfssl\" + """Return vulnerability data stored in index \"wordfence\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WolfSSL Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfssl?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wordfence Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wordfence?cursor=` :param page: set the page number of the response :type page: int @@ -313039,7 +314366,7 @@ async def index_wolfssl_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wolfssl_get_serialize( + _param = self._index_wordfence_get_serialize( page=page, limit=limit, cursor=cursor, @@ -313071,7 +314398,7 @@ async def index_wolfssl_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination", '404': "str", '500': "str", } @@ -313082,7 +314409,7 @@ async def index_wolfssl_get_without_preload_content( return response_data.response - def _index_wolfssl_get_serialize( + def _index_wordfence_get_serialize( self, page, limit, @@ -313250,7 +314577,7 @@ def _index_wolfssl_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/wolfssl', + resource_path='/v3/index/wordfence', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -313267,7 +314594,7 @@ def _index_wolfssl_get_serialize( @validate_call - async def index_wordfence_get( + async def index_xen_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -313305,10 +314632,10 @@ async def index_wordfence_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination: - """Return vulnerability data stored in index \"wordfence\" + ) -> RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination: + """Return vulnerability data stored in index \"xen\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wordfence Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wordfence?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xen index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xen Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xen?cursor=` :param page: set the page number of the response :type page: int @@ -313380,7 +314707,7 @@ async def index_wordfence_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wordfence_get_serialize( + _param = self._index_xen_get_serialize( page=page, limit=limit, cursor=cursor, @@ -313412,7 +314739,7 @@ async def index_wordfence_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination", '404': "str", '500': "str", } @@ -313428,7 +314755,7 @@ async def index_wordfence_get( @validate_call - async def index_wordfence_get_with_http_info( + async def index_xen_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -313466,10 +314793,10 @@ async def index_wordfence_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination]: - """Return vulnerability data stored in index \"wordfence\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination]: + """Return vulnerability data stored in index \"xen\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wordfence Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wordfence?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xen index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xen Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xen?cursor=` :param page: set the page number of the response :type page: int @@ -313541,7 +314868,7 @@ async def index_wordfence_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wordfence_get_serialize( + _param = self._index_xen_get_serialize( page=page, limit=limit, cursor=cursor, @@ -313573,7 +314900,7 @@ async def index_wordfence_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination", '404': "str", '500': "str", } @@ -313589,7 +314916,7 @@ async def index_wordfence_get_with_http_info( @validate_call - async def index_wordfence_get_without_preload_content( + async def index_xen_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -313628,9 +314955,9 @@ async def index_wordfence_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"wordfence\" + """Return vulnerability data stored in index \"xen\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wordfence Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wordfence?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xen index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xen Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xen?cursor=` :param page: set the page number of the response :type page: int @@ -313702,7 +315029,7 @@ async def index_wordfence_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wordfence_get_serialize( + _param = self._index_xen_get_serialize( page=page, limit=limit, cursor=cursor, @@ -313734,7 +315061,7 @@ async def index_wordfence_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination", '404': "str", '500': "str", } @@ -313745,7 +315072,7 @@ async def index_wordfence_get_without_preload_content( return response_data.response - def _index_wordfence_get_serialize( + def _index_xen_get_serialize( self, page, limit, @@ -313913,7 +315240,7 @@ def _index_wordfence_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/wordfence', + resource_path='/v3/index/xen', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -313930,7 +315257,7 @@ def _index_wordfence_get_serialize( @validate_call - async def index_xen_get( + async def index_xerox_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -313968,10 +315295,10 @@ async def index_xen_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination: - """Return vulnerability data stored in index \"xen\" + ) -> RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination: + """Return vulnerability data stored in index \"xerox\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xen index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xen Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xen?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xerox Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xerox?cursor=` :param page: set the page number of the response :type page: int @@ -314043,7 +315370,7 @@ async def index_xen_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xen_get_serialize( + _param = self._index_xerox_get_serialize( page=page, limit=limit, cursor=cursor, @@ -314075,7 +315402,7 @@ async def index_xen_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination", '404': "str", '500': "str", } @@ -314091,7 +315418,7 @@ async def index_xen_get( @validate_call - async def index_xen_get_with_http_info( + async def index_xerox_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -314129,10 +315456,10 @@ async def index_xen_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination]: - """Return vulnerability data stored in index \"xen\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination]: + """Return vulnerability data stored in index \"xerox\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xen index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xen Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xen?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xerox Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xerox?cursor=` :param page: set the page number of the response :type page: int @@ -314204,7 +315531,7 @@ async def index_xen_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xen_get_serialize( + _param = self._index_xerox_get_serialize( page=page, limit=limit, cursor=cursor, @@ -314236,7 +315563,7 @@ async def index_xen_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination", '404': "str", '500': "str", } @@ -314252,7 +315579,7 @@ async def index_xen_get_with_http_info( @validate_call - async def index_xen_get_without_preload_content( + async def index_xerox_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -314291,9 +315618,9 @@ async def index_xen_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"xen\" + """Return vulnerability data stored in index \"xerox\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xen index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xen Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xen?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xerox Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xerox?cursor=` :param page: set the page number of the response :type page: int @@ -314365,7 +315692,7 @@ async def index_xen_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xen_get_serialize( + _param = self._index_xerox_get_serialize( page=page, limit=limit, cursor=cursor, @@ -314397,7 +315724,7 @@ async def index_xen_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination", '404': "str", '500': "str", } @@ -314408,7 +315735,7 @@ async def index_xen_get_without_preload_content( return response_data.response - def _index_xen_get_serialize( + def _index_xerox_get_serialize( self, page, limit, @@ -314576,7 +315903,7 @@ def _index_xen_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/xen', + resource_path='/v3/index/xerox', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -314593,7 +315920,7 @@ def _index_xen_get_serialize( @validate_call - async def index_xerox_get( + async def index_xiaomi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -314631,10 +315958,10 @@ async def index_xerox_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination: - """Return vulnerability data stored in index \"xerox\" + ) -> RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination: + """Return vulnerability data stored in index \"xiaomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xerox Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xerox?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xiaomi Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xiaomi?cursor=` :param page: set the page number of the response :type page: int @@ -314706,7 +316033,7 @@ async def index_xerox_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xerox_get_serialize( + _param = self._index_xiaomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -314738,7 +316065,7 @@ async def index_xerox_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination", '404': "str", '500': "str", } @@ -314754,7 +316081,7 @@ async def index_xerox_get( @validate_call - async def index_xerox_get_with_http_info( + async def index_xiaomi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -314792,10 +316119,10 @@ async def index_xerox_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination]: - """Return vulnerability data stored in index \"xerox\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination]: + """Return vulnerability data stored in index \"xiaomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xerox Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xerox?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xiaomi Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xiaomi?cursor=` :param page: set the page number of the response :type page: int @@ -314867,7 +316194,7 @@ async def index_xerox_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xerox_get_serialize( + _param = self._index_xiaomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -314899,7 +316226,7 @@ async def index_xerox_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination", '404': "str", '500': "str", } @@ -314915,7 +316242,7 @@ async def index_xerox_get_with_http_info( @validate_call - async def index_xerox_get_without_preload_content( + async def index_xiaomi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -314954,9 +316281,9 @@ async def index_xerox_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"xerox\" + """Return vulnerability data stored in index \"xiaomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xerox Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xerox?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xiaomi Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xiaomi?cursor=` :param page: set the page number of the response :type page: int @@ -315028,7 +316355,7 @@ async def index_xerox_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xerox_get_serialize( + _param = self._index_xiaomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -315060,7 +316387,7 @@ async def index_xerox_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination", '404': "str", '500': "str", } @@ -315071,7 +316398,7 @@ async def index_xerox_get_without_preload_content( return response_data.response - def _index_xerox_get_serialize( + def _index_xiaomi_get_serialize( self, page, limit, @@ -315239,7 +316566,7 @@ def _index_xerox_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/xerox', + resource_path='/v3/index/xiaomi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -315256,7 +316583,7 @@ def _index_xerox_get_serialize( @validate_call - async def index_xiaomi_get( + async def index_xylem_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -315294,10 +316621,10 @@ async def index_xiaomi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination: - """Return vulnerability data stored in index \"xiaomi\" + ) -> RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination: + """Return vulnerability data stored in index \"xylem\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xiaomi Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xiaomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xylem Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xylem?cursor=` :param page: set the page number of the response :type page: int @@ -315369,7 +316696,7 @@ async def index_xiaomi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xiaomi_get_serialize( + _param = self._index_xylem_get_serialize( page=page, limit=limit, cursor=cursor, @@ -315401,7 +316728,7 @@ async def index_xiaomi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination", '404': "str", '500': "str", } @@ -315417,7 +316744,7 @@ async def index_xiaomi_get( @validate_call - async def index_xiaomi_get_with_http_info( + async def index_xylem_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -315455,10 +316782,10 @@ async def index_xiaomi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination]: - """Return vulnerability data stored in index \"xiaomi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination]: + """Return vulnerability data stored in index \"xylem\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xiaomi Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xiaomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xylem Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xylem?cursor=` :param page: set the page number of the response :type page: int @@ -315530,7 +316857,7 @@ async def index_xiaomi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xiaomi_get_serialize( + _param = self._index_xylem_get_serialize( page=page, limit=limit, cursor=cursor, @@ -315562,7 +316889,7 @@ async def index_xiaomi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination", '404': "str", '500': "str", } @@ -315578,7 +316905,7 @@ async def index_xiaomi_get_with_http_info( @validate_call - async def index_xiaomi_get_without_preload_content( + async def index_xylem_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -315617,9 +316944,9 @@ async def index_xiaomi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"xiaomi\" + """Return vulnerability data stored in index \"xylem\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xiaomi Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xiaomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xylem Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xylem?cursor=` :param page: set the page number of the response :type page: int @@ -315691,7 +317018,7 @@ async def index_xiaomi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xiaomi_get_serialize( + _param = self._index_xylem_get_serialize( page=page, limit=limit, cursor=cursor, @@ -315723,7 +317050,7 @@ async def index_xiaomi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination", '404': "str", '500': "str", } @@ -315734,7 +317061,7 @@ async def index_xiaomi_get_without_preload_content( return response_data.response - def _index_xiaomi_get_serialize( + def _index_xylem_get_serialize( self, page, limit, @@ -315902,7 +317229,7 @@ def _index_xiaomi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/xiaomi', + resource_path='/v3/index/xylem', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -315919,7 +317246,7 @@ def _index_xiaomi_get_serialize( @validate_call - async def index_xylem_get( + async def index_yamaha_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -315957,10 +317284,10 @@ async def index_xylem_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination: - """Return vulnerability data stored in index \"xylem\" + ) -> RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination: + """Return vulnerability data stored in index \"yamaha\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xylem Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xylem?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yamaha Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yamaha?cursor=` :param page: set the page number of the response :type page: int @@ -316032,7 +317359,7 @@ async def index_xylem_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xylem_get_serialize( + _param = self._index_yamaha_get_serialize( page=page, limit=limit, cursor=cursor, @@ -316064,7 +317391,7 @@ async def index_xylem_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination", '404': "str", '500': "str", } @@ -316080,7 +317407,7 @@ async def index_xylem_get( @validate_call - async def index_xylem_get_with_http_info( + async def index_yamaha_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -316118,10 +317445,10 @@ async def index_xylem_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination]: - """Return vulnerability data stored in index \"xylem\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination]: + """Return vulnerability data stored in index \"yamaha\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xylem Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xylem?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yamaha Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yamaha?cursor=` :param page: set the page number of the response :type page: int @@ -316193,7 +317520,7 @@ async def index_xylem_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xylem_get_serialize( + _param = self._index_yamaha_get_serialize( page=page, limit=limit, cursor=cursor, @@ -316225,7 +317552,7 @@ async def index_xylem_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination", '404': "str", '500': "str", } @@ -316241,7 +317568,7 @@ async def index_xylem_get_with_http_info( @validate_call - async def index_xylem_get_without_preload_content( + async def index_yamaha_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -316280,9 +317607,9 @@ async def index_xylem_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"xylem\" + """Return vulnerability data stored in index \"yamaha\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xylem Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xylem?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yamaha Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yamaha?cursor=` :param page: set the page number of the response :type page: int @@ -316354,7 +317681,7 @@ async def index_xylem_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xylem_get_serialize( + _param = self._index_yamaha_get_serialize( page=page, limit=limit, cursor=cursor, @@ -316386,7 +317713,7 @@ async def index_xylem_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination", '404': "str", '500': "str", } @@ -316397,7 +317724,7 @@ async def index_xylem_get_without_preload_content( return response_data.response - def _index_xylem_get_serialize( + def _index_yamaha_get_serialize( self, page, limit, @@ -316565,7 +317892,7 @@ def _index_xylem_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/xylem', + resource_path='/v3/index/yamaha', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -316582,7 +317909,7 @@ def _index_xylem_get_serialize( @validate_call - async def index_yamaha_get( + async def index_yokogawa_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -316620,10 +317947,10 @@ async def index_yamaha_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination: - """Return vulnerability data stored in index \"yamaha\" + ) -> RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"yokogawa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yamaha Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yamaha?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yokogawa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yokogawa?cursor=` :param page: set the page number of the response :type page: int @@ -316695,7 +318022,7 @@ async def index_yamaha_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yamaha_get_serialize( + _param = self._index_yokogawa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -316727,7 +318054,7 @@ async def index_yamaha_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -316743,7 +318070,7 @@ async def index_yamaha_get( @validate_call - async def index_yamaha_get_with_http_info( + async def index_yokogawa_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -316781,10 +318108,10 @@ async def index_yamaha_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination]: - """Return vulnerability data stored in index \"yamaha\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"yokogawa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yamaha Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yamaha?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yokogawa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yokogawa?cursor=` :param page: set the page number of the response :type page: int @@ -316856,7 +318183,7 @@ async def index_yamaha_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yamaha_get_serialize( + _param = self._index_yokogawa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -316888,7 +318215,7 @@ async def index_yamaha_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -316904,7 +318231,7 @@ async def index_yamaha_get_with_http_info( @validate_call - async def index_yamaha_get_without_preload_content( + async def index_yokogawa_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -316943,9 +318270,9 @@ async def index_yamaha_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"yamaha\" + """Return vulnerability data stored in index \"yokogawa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yamaha Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yamaha?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yokogawa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yokogawa?cursor=` :param page: set the page number of the response :type page: int @@ -317017,7 +318344,7 @@ async def index_yamaha_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yamaha_get_serialize( + _param = self._index_yokogawa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -317049,7 +318376,7 @@ async def index_yamaha_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -317060,7 +318387,7 @@ async def index_yamaha_get_without_preload_content( return response_data.response - def _index_yamaha_get_serialize( + def _index_yokogawa_get_serialize( self, page, limit, @@ -317228,7 +318555,7 @@ def _index_yamaha_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/yamaha', + resource_path='/v3/index/yokogawa', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -317245,7 +318572,7 @@ def _index_yamaha_get_serialize( @validate_call - async def index_yokogawa_get( + async def index_yubico_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -317283,10 +318610,10 @@ async def index_yokogawa_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"yokogawa\" + ) -> RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination: + """Return vulnerability data stored in index \"yubico\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yokogawa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yokogawa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yubico Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yubico?cursor=` :param page: set the page number of the response :type page: int @@ -317358,7 +318685,7 @@ async def index_yokogawa_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yokogawa_get_serialize( + _param = self._index_yubico_get_serialize( page=page, limit=limit, cursor=cursor, @@ -317390,7 +318717,7 @@ async def index_yokogawa_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination", '404': "str", '500': "str", } @@ -317406,7 +318733,7 @@ async def index_yokogawa_get( @validate_call - async def index_yokogawa_get_with_http_info( + async def index_yubico_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -317444,10 +318771,10 @@ async def index_yokogawa_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"yokogawa\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination]: + """Return vulnerability data stored in index \"yubico\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yokogawa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yokogawa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yubico Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yubico?cursor=` :param page: set the page number of the response :type page: int @@ -317519,7 +318846,7 @@ async def index_yokogawa_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yokogawa_get_serialize( + _param = self._index_yubico_get_serialize( page=page, limit=limit, cursor=cursor, @@ -317551,7 +318878,7 @@ async def index_yokogawa_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination", '404': "str", '500': "str", } @@ -317567,7 +318894,7 @@ async def index_yokogawa_get_with_http_info( @validate_call - async def index_yokogawa_get_without_preload_content( + async def index_yubico_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -317606,9 +318933,9 @@ async def index_yokogawa_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"yokogawa\" + """Return vulnerability data stored in index \"yubico\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yokogawa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yokogawa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yubico Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yubico?cursor=` :param page: set the page number of the response :type page: int @@ -317680,7 +319007,7 @@ async def index_yokogawa_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yokogawa_get_serialize( + _param = self._index_yubico_get_serialize( page=page, limit=limit, cursor=cursor, @@ -317712,7 +319039,7 @@ async def index_yokogawa_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination", '404': "str", '500': "str", } @@ -317723,7 +319050,7 @@ async def index_yokogawa_get_without_preload_content( return response_data.response - def _index_yokogawa_get_serialize( + def _index_yubico_get_serialize( self, page, limit, @@ -317891,7 +319218,7 @@ def _index_yokogawa_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/yokogawa', + resource_path='/v3/index/yubico', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -317908,7 +319235,7 @@ def _index_yokogawa_get_serialize( @validate_call - async def index_yubico_get( + async def index_zdi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -317946,10 +319273,10 @@ async def index_yubico_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination: - """Return vulnerability data stored in index \"yubico\" + ) -> RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"zdi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yubico Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yubico?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zero Day Initiative Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zdi?cursor=` :param page: set the page number of the response :type page: int @@ -318021,7 +319348,7 @@ async def index_yubico_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yubico_get_serialize( + _param = self._index_zdi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -318053,7 +319380,7 @@ async def index_yubico_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -318069,7 +319396,7 @@ async def index_yubico_get( @validate_call - async def index_yubico_get_with_http_info( + async def index_zdi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -318107,10 +319434,10 @@ async def index_yubico_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination]: - """Return vulnerability data stored in index \"yubico\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"zdi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yubico Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yubico?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zero Day Initiative Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zdi?cursor=` :param page: set the page number of the response :type page: int @@ -318182,7 +319509,7 @@ async def index_yubico_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yubico_get_serialize( + _param = self._index_zdi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -318214,7 +319541,7 @@ async def index_yubico_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -318230,7 +319557,7 @@ async def index_yubico_get_with_http_info( @validate_call - async def index_yubico_get_without_preload_content( + async def index_zdi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -318269,9 +319596,9 @@ async def index_yubico_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"yubico\" + """Return vulnerability data stored in index \"zdi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yubico Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yubico?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zero Day Initiative Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zdi?cursor=` :param page: set the page number of the response :type page: int @@ -318343,7 +319670,7 @@ async def index_yubico_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yubico_get_serialize( + _param = self._index_zdi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -318375,7 +319702,7 @@ async def index_yubico_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -318386,7 +319713,7 @@ async def index_yubico_get_without_preload_content( return response_data.response - def _index_yubico_get_serialize( + def _index_zdi_get_serialize( self, page, limit, @@ -318554,7 +319881,7 @@ def _index_yubico_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/yubico', + resource_path='/v3/index/zdi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -318571,7 +319898,7 @@ def _index_yubico_get_serialize( @validate_call - async def index_zdi_get( + async def index_zebra_eol_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -318609,10 +319936,10 @@ async def index_zdi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"zdi\" + ) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: + """Return vulnerability data stored in index \"zebra-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zero Day Initiative Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zdi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zebra-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zebra End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zebra-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zebra-eol?cursor=` :param page: set the page number of the response :type page: int @@ -318684,7 +320011,7 @@ async def index_zdi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_zdi_get_serialize( + _param = self._index_zebra_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -318716,7 +320043,7 @@ async def index_zdi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -318732,7 +320059,7 @@ async def index_zdi_get( @validate_call - async def index_zdi_get_with_http_info( + async def index_zebra_eol_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -318770,10 +320097,10 @@ async def index_zdi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"zdi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination]: + """Return vulnerability data stored in index \"zebra-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zero Day Initiative Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zdi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zebra-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zebra End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zebra-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zebra-eol?cursor=` :param page: set the page number of the response :type page: int @@ -318845,7 +320172,7 @@ async def index_zdi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_zdi_get_serialize( + _param = self._index_zebra_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -318877,7 +320204,7 @@ async def index_zdi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -318893,7 +320220,7 @@ async def index_zdi_get_with_http_info( @validate_call - async def index_zdi_get_without_preload_content( + async def index_zebra_eol_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -318932,9 +320259,9 @@ async def index_zdi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"zdi\" + """Return vulnerability data stored in index \"zebra-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zero Day Initiative Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zdi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zebra-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zebra End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zebra-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zebra-eol?cursor=` :param page: set the page number of the response :type page: int @@ -319006,7 +320333,7 @@ async def index_zdi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_zdi_get_serialize( + _param = self._index_zebra_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -319038,7 +320365,7 @@ async def index_zdi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -319049,7 +320376,7 @@ async def index_zdi_get_without_preload_content( return response_data.response - def _index_zdi_get_serialize( + def _index_zebra_eol_get_serialize( self, page, limit, @@ -319217,7 +320544,7 @@ def _index_zdi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/zdi', + resource_path='/v3/index/zebra-eol', path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/vulncheck_sdk/aio/api_client.py b/vulncheck_sdk/aio/api_client.py index cadbbb4a..b3b608fa 100644 --- a/vulncheck_sdk/aio/api_client.py +++ b/vulncheck_sdk/aio/api_client.py @@ -92,7 +92,7 @@ def __init__( self.default_headers[header_name] = header_value self.cookie = cookie # Set default User-Agent. - self.user_agent = 'OpenAPI-Generator/0.0.44/python' + self.user_agent = 'OpenAPI-Generator/0.0.45/python' self.client_side_validation = configuration.client_side_validation async def __aenter__(self): diff --git a/vulncheck_sdk/aio/configuration.py b/vulncheck_sdk/aio/configuration.py index 0a64e92f..9c96a791 100644 --- a/vulncheck_sdk/aio/configuration.py +++ b/vulncheck_sdk/aio/configuration.py @@ -532,7 +532,7 @@ def to_debug_report(self) -> str: "OS: {env}\n"\ "Python Version: {pyversion}\n"\ "Version of the API: latest\n"\ - "SDK Package Version: 0.0.44".\ + "SDK Package Version: 0.0.45".\ format(env=sys.platform, pyversion=sys.version) def get_host_settings(self) -> List[HostSetting]: diff --git a/vulncheck_sdk/aio/models/__init__.py b/vulncheck_sdk/aio/models/__init__.py index 16b2dd85..a0da693a 100644 --- a/vulncheck_sdk/aio/models/__init__.py +++ b/vulncheck_sdk/aio/models/__init__.py @@ -295,6 +295,11 @@ from vulncheck_sdk.aio.models.advisory_gmo_cyber_security import AdvisoryGMOCyberSecurity from vulncheck_sdk.aio.models.advisory_gallagher import AdvisoryGallagher from vulncheck_sdk.aio.models.advisory_gen import AdvisoryGen +from vulncheck_sdk.aio.models.advisory_generic_eol import AdvisoryGenericEOL +from vulncheck_sdk.aio.models.advisory_generic_eol_core import AdvisoryGenericEOLCore +from vulncheck_sdk.aio.models.advisory_generic_eol_product import AdvisoryGenericEOLProduct +from vulncheck_sdk.aio.models.advisory_generic_eol_reference import AdvisoryGenericEOLReference +from vulncheck_sdk.aio.models.advisory_generic_eolvc_info import AdvisoryGenericEOLVCInfo from vulncheck_sdk.aio.models.advisory_genetec import AdvisoryGenetec from vulncheck_sdk.aio.models.advisory_gigabyte import AdvisoryGigabyte from vulncheck_sdk.aio.models.advisory_git_hub_exploit import AdvisoryGitHubExploit @@ -1032,6 +1037,7 @@ from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_gallagher_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_gen_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination +from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_genetec_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_gigabyte_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination from vulncheck_sdk.aio.models.render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination diff --git a/vulncheck_sdk/aio/models/advisory_generic_eol.py b/vulncheck_sdk/aio/models/advisory_generic_eol.py new file mode 100644 index 00000000..29bc0f60 --- /dev/null +++ b/vulncheck_sdk/aio/models/advisory_generic_eol.py @@ -0,0 +1,104 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from vulncheck_sdk.aio.models.advisory_generic_eol_core import AdvisoryGenericEOLCore +from vulncheck_sdk.aio.models.advisory_generic_eol_product import AdvisoryGenericEOLProduct +from vulncheck_sdk.aio.models.advisory_generic_eolvc_info import AdvisoryGenericEOLVCInfo +from typing import Optional, Set +from typing_extensions import Self + +class AdvisoryGenericEOL(BaseModel): + """ + advisory.GenericEOL + """ # noqa: E501 + core: Optional[AdvisoryGenericEOLCore] = None + product: Optional[AdvisoryGenericEOLProduct] = None + vc_info: Optional[AdvisoryGenericEOLVCInfo] = Field(default=None, alias="vcInfo") + __properties: ClassVar[List[str]] = ["core", "product", "vcInfo"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOL from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + # override the default output from pydantic by calling `to_dict()` of core + if self.core: + _dict['core'] = self.core.to_dict() + # override the default output from pydantic by calling `to_dict()` of product + if self.product: + _dict['product'] = self.product.to_dict() + # override the default output from pydantic by calling `to_dict()` of vc_info + if self.vc_info: + _dict['vcInfo'] = self.vc_info.to_dict() + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOL from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "core": AdvisoryGenericEOLCore.from_dict(obj["core"]) if obj.get("core") is not None else None, + "product": AdvisoryGenericEOLProduct.from_dict(obj["product"]) if obj.get("product") is not None else None, + "vcInfo": AdvisoryGenericEOLVCInfo.from_dict(obj["vcInfo"]) if obj.get("vcInfo") is not None else None + }) + return _obj + + diff --git a/vulncheck_sdk/aio/models/advisory_generic_eol_core.py b/vulncheck_sdk/aio/models/advisory_generic_eol_core.py new file mode 100644 index 00000000..f57276d3 --- /dev/null +++ b/vulncheck_sdk/aio/models/advisory_generic_eol_core.py @@ -0,0 +1,94 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set +from typing_extensions import Self + +class AdvisoryGenericEOLCore(BaseModel): + """ + advisory.GenericEOLCore + """ # noqa: E501 + end_of_life: Optional[StrictStr] = None + end_of_sales: Optional[StrictStr] = None + end_of_security_support: Optional[StrictStr] = None + last_updated: Optional[StrictStr] = None + __properties: ClassVar[List[str]] = ["end_of_life", "end_of_sales", "end_of_security_support", "last_updated"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLCore from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLCore from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "end_of_life": obj.get("end_of_life"), + "end_of_sales": obj.get("end_of_sales"), + "end_of_security_support": obj.get("end_of_security_support"), + "last_updated": obj.get("last_updated") + }) + return _obj + + diff --git a/vulncheck_sdk/aio/models/advisory_generic_eol_product.py b/vulncheck_sdk/aio/models/advisory_generic_eol_product.py new file mode 100644 index 00000000..28c1ccd8 --- /dev/null +++ b/vulncheck_sdk/aio/models/advisory_generic_eol_product.py @@ -0,0 +1,92 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set +from typing_extensions import Self + +class AdvisoryGenericEOLProduct(BaseModel): + """ + advisory.GenericEOLProduct + """ # noqa: E501 + product_name: Optional[StrictStr] = None + product_version: Optional[StrictStr] = None + vendor_name: Optional[StrictStr] = None + __properties: ClassVar[List[str]] = ["product_name", "product_version", "vendor_name"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLProduct from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLProduct from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "product_name": obj.get("product_name"), + "product_version": obj.get("product_version"), + "vendor_name": obj.get("vendor_name") + }) + return _obj + + diff --git a/vulncheck_sdk/aio/models/advisory_generic_eol_reference.py b/vulncheck_sdk/aio/models/advisory_generic_eol_reference.py new file mode 100644 index 00000000..e4d8c129 --- /dev/null +++ b/vulncheck_sdk/aio/models/advisory_generic_eol_reference.py @@ -0,0 +1,90 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set +from typing_extensions import Self + +class AdvisoryGenericEOLReference(BaseModel): + """ + advisory.GenericEOLReference + """ # noqa: E501 + description: Optional[StrictStr] = None + url: Optional[StrictStr] = None + __properties: ClassVar[List[str]] = ["description", "url"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLReference from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLReference from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "description": obj.get("description"), + "url": obj.get("url") + }) + return _obj + + diff --git a/vulncheck_sdk/aio/models/advisory_generic_eolvc_info.py b/vulncheck_sdk/aio/models/advisory_generic_eolvc_info.py new file mode 100644 index 00000000..56479b4b --- /dev/null +++ b/vulncheck_sdk/aio/models/advisory_generic_eolvc_info.py @@ -0,0 +1,110 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from vulncheck_sdk.aio.models.advisory_generic_eol_product import AdvisoryGenericEOLProduct +from vulncheck_sdk.aio.models.advisory_generic_eol_reference import AdvisoryGenericEOLReference +from typing import Optional, Set +from typing_extensions import Self + +class AdvisoryGenericEOLVCInfo(BaseModel): + """ + advisory.GenericEOLVCInfo + """ # noqa: E501 + cve: Optional[List[StrictStr]] = None + date_added: Optional[StrictStr] = None + references: Optional[List[AdvisoryGenericEOLReference]] = None + replacement: Optional[AdvisoryGenericEOLProduct] = None + updated_at: Optional[StrictStr] = None + version: Optional[StrictStr] = None + __properties: ClassVar[List[str]] = ["cve", "date_added", "references", "replacement", "updated_at", "version"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLVCInfo from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + # override the default output from pydantic by calling `to_dict()` of each item in references (list) + _items = [] + if self.references: + for _item_references in self.references: + if _item_references: + _items.append(_item_references.to_dict()) + _dict['references'] = _items + # override the default output from pydantic by calling `to_dict()` of replacement + if self.replacement: + _dict['replacement'] = self.replacement.to_dict() + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLVCInfo from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "cve": obj.get("cve"), + "date_added": obj.get("date_added"), + "references": [AdvisoryGenericEOLReference.from_dict(_item) for _item in obj["references"]] if obj.get("references") is not None else None, + "replacement": AdvisoryGenericEOLProduct.from_dict(obj["replacement"]) if obj.get("replacement") is not None else None, + "updated_at": obj.get("updated_at"), + "version": obj.get("version") + }) + return _obj + + diff --git a/vulncheck_sdk/aio/models/advisory_j_frog.py b/vulncheck_sdk/aio/models/advisory_j_frog.py index 40393862..1e4b874d 100644 --- a/vulncheck_sdk/aio/models/advisory_j_frog.py +++ b/vulncheck_sdk/aio/models/advisory_j_frog.py @@ -34,9 +34,10 @@ class AdvisoryJFrog(BaseModel): product: Optional[StrictStr] = None severity: Optional[StrictStr] = None summary: Optional[StrictStr] = None + updated_at: Optional[StrictStr] = None url: Optional[StrictStr] = None versions: Optional[List[StrictStr]] = None - __properties: ClassVar[List[str]] = ["cpes", "cve", "date_added", "product", "severity", "summary", "url", "versions"] + __properties: ClassVar[List[str]] = ["cpes", "cve", "date_added", "product", "severity", "summary", "updated_at", "url", "versions"] model_config = ConfigDict( populate_by_name=True, @@ -102,6 +103,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "product": obj.get("product"), "severity": obj.get("severity"), "summary": obj.get("summary"), + "updated_at": obj.get("updated_at"), "url": obj.get("url"), "versions": obj.get("versions") }) diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_generic_eol_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_generic_eol_paginate_pagination.py new file mode 100644 index 00000000..349893e6 --- /dev/null +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_generic_eol_paginate_pagination.py @@ -0,0 +1,104 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, Field, StrictFloat, StrictInt +from typing import Any, ClassVar, Dict, List, Optional, Union +from vulncheck_sdk.aio.models.advisory_generic_eol import AdvisoryGenericEOL +from vulncheck_sdk.aio.models.paginate_pagination import PaginatePagination +from typing import Optional, Set +from typing_extensions import Self + +class RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination(BaseModel): + """ + render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination + """ # noqa: E501 + benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") + meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") + data: Optional[List[AdvisoryGenericEOL]] = None + __properties: ClassVar[List[str]] = ["_benchmark", "_meta", "data"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + # override the default output from pydantic by calling `to_dict()` of meta + if self.meta: + _dict['_meta'] = self.meta.to_dict() + # override the default output from pydantic by calling `to_dict()` of each item in data (list) + _items = [] + if self.data: + for _item_data in self.data: + if _item_data: + _items.append(_item_data.to_dict()) + _dict['data'] = _items + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "_benchmark": obj.get("_benchmark"), + "_meta": PaginatePagination.from_dict(obj["_meta"]) if obj.get("_meta") is not None else None, + "data": [AdvisoryGenericEOL.from_dict(_item) for _item in obj["data"]] if obj.get("data") is not None else None + }) + return _obj + + diff --git a/vulncheck_sdk/api/indices_api.py b/vulncheck_sdk/api/indices_api.py index 0e82e261..d4d7c93f 100644 --- a/vulncheck_sdk/api/indices_api.py +++ b/vulncheck_sdk/api/indices_api.py @@ -191,6 +191,7 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gallagher_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gen_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_genetec_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gigabyte_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination @@ -211675,7 +211676,7 @@ def _index_okta_get_serialize( @validate_call - def index_omron_get( + def index_omron_eol_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211713,10 +211714,10 @@ def index_omron_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination: - """Return vulnerability data stored in index \"omron\" + ) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: + """Return vulnerability data stored in index \"omron-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` :param page: set the page number of the response :type page: int @@ -211788,7 +211789,7 @@ def index_omron_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_omron_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211820,7 +211821,7 @@ def index_omron_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -211836,7 +211837,7 @@ def index_omron_get( @validate_call - def index_omron_get_with_http_info( + def index_omron_eol_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211874,10 +211875,10 @@ def index_omron_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination]: - """Return vulnerability data stored in index \"omron\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination]: + """Return vulnerability data stored in index \"omron-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` :param page: set the page number of the response :type page: int @@ -211949,7 +211950,7 @@ def index_omron_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_omron_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211981,7 +211982,7 @@ def index_omron_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -211997,7 +211998,7 @@ def index_omron_get_with_http_info( @validate_call - def index_omron_get_without_preload_content( + def index_omron_eol_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212036,9 +212037,9 @@ def index_omron_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"omron\" + """Return vulnerability data stored in index \"omron-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` :param page: set the page number of the response :type page: int @@ -212110,7 +212111,7 @@ def index_omron_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_omron_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212142,7 +212143,7 @@ def index_omron_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -212153,7 +212154,7 @@ def index_omron_get_without_preload_content( return response_data.response - def _index_omron_get_serialize( + def _index_omron_eol_get_serialize( self, page, limit, @@ -212321,7 +212322,7 @@ def _index_omron_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/omron', + resource_path='/v3/index/omron-eol', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -212338,7 +212339,7 @@ def _index_omron_get_serialize( @validate_call - def index_one_e_get( + def index_omron_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212376,10 +212377,10 @@ def index_one_e_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination: - """Return vulnerability data stored in index \"one-e\" + ) -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination: + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -212451,7 +212452,7 @@ def index_one_e_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212483,7 +212484,7 @@ def index_one_e_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -212499,7 +212500,7 @@ def index_one_e_get( @validate_call - def index_one_e_get_with_http_info( + def index_omron_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212537,10 +212538,10 @@ def index_one_e_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination]: - """Return vulnerability data stored in index \"one-e\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination]: + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -212612,7 +212613,7 @@ def index_one_e_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212644,7 +212645,7 @@ def index_one_e_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -212660,7 +212661,7 @@ def index_one_e_get_with_http_info( @validate_call - def index_one_e_get_without_preload_content( + def index_omron_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212699,9 +212700,9 @@ def index_one_e_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"one-e\" + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -212773,7 +212774,7 @@ def index_one_e_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212805,7 +212806,7 @@ def index_one_e_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -212816,7 +212817,7 @@ def index_one_e_get_without_preload_content( return response_data.response - def _index_one_e_get_serialize( + def _index_omron_get_serialize( self, page, limit, @@ -212984,7 +212985,7 @@ def _index_one_e_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/one-e', + resource_path='/v3/index/omron', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -213001,7 +213002,7 @@ def _index_one_e_get_serialize( @validate_call - def index_opam_get( + def index_one_e_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213039,10 +213040,10 @@ def index_opam_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"opam\" + ) -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination: + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -213114,7 +213115,7 @@ def index_opam_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213146,7 +213147,7 @@ def index_opam_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -213162,7 +213163,7 @@ def index_opam_get( @validate_call - def index_opam_get_with_http_info( + def index_one_e_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213200,10 +213201,10 @@ def index_opam_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"opam\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination]: + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -213275,7 +213276,7 @@ def index_opam_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213307,7 +213308,7 @@ def index_opam_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -213323,7 +213324,7 @@ def index_opam_get_with_http_info( @validate_call - def index_opam_get_without_preload_content( + def index_one_e_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213362,9 +213363,9 @@ def index_opam_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"opam\" + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -213436,7 +213437,7 @@ def index_opam_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213468,7 +213469,7 @@ def index_opam_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -213479,7 +213480,7 @@ def index_opam_get_without_preload_content( return response_data.response - def _index_opam_get_serialize( + def _index_one_e_get_serialize( self, page, limit, @@ -213647,7 +213648,7 @@ def _index_opam_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/opam', + resource_path='/v3/index/one-e', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -213664,7 +213665,7 @@ def _index_opam_get_serialize( @validate_call - def index_open_cvdb_get( + def index_opam_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213702,10 +213703,10 @@ def index_open_cvdb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination: - """Return vulnerability data stored in index \"open-cvdb\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -213777,7 +213778,7 @@ def index_open_cvdb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213809,7 +213810,7 @@ def index_open_cvdb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -213825,7 +213826,7 @@ def index_open_cvdb_get( @validate_call - def index_open_cvdb_get_with_http_info( + def index_opam_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213863,10 +213864,10 @@ def index_open_cvdb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination]: - """Return vulnerability data stored in index \"open-cvdb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -213938,7 +213939,7 @@ def index_open_cvdb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213970,7 +213971,7 @@ def index_open_cvdb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -213986,7 +213987,7 @@ def index_open_cvdb_get_with_http_info( @validate_call - def index_open_cvdb_get_without_preload_content( + def index_opam_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214025,9 +214026,9 @@ def index_open_cvdb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"open-cvdb\" + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -214099,7 +214100,7 @@ def index_open_cvdb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214131,7 +214132,7 @@ def index_open_cvdb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -214142,7 +214143,7 @@ def index_open_cvdb_get_without_preload_content( return response_data.response - def _index_open_cvdb_get_serialize( + def _index_opam_get_serialize( self, page, limit, @@ -214310,7 +214311,7 @@ def _index_open_cvdb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/open-cvdb', + resource_path='/v3/index/opam', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -214327,7 +214328,7 @@ def _index_open_cvdb_get_serialize( @validate_call - def index_openbsd_get( + def index_open_cvdb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214365,10 +214366,10 @@ def index_openbsd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination: - """Return vulnerability data stored in index \"openbsd\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination: + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -214440,7 +214441,7 @@ def index_openbsd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214472,7 +214473,7 @@ def index_openbsd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -214488,7 +214489,7 @@ def index_openbsd_get( @validate_call - def index_openbsd_get_with_http_info( + def index_open_cvdb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214526,10 +214527,10 @@ def index_openbsd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination]: - """Return vulnerability data stored in index \"openbsd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination]: + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -214601,7 +214602,7 @@ def index_openbsd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214633,7 +214634,7 @@ def index_openbsd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -214649,7 +214650,7 @@ def index_openbsd_get_with_http_info( @validate_call - def index_openbsd_get_without_preload_content( + def index_open_cvdb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214688,9 +214689,9 @@ def index_openbsd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openbsd\" + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -214762,7 +214763,7 @@ def index_openbsd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214794,7 +214795,7 @@ def index_openbsd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -214805,7 +214806,7 @@ def index_openbsd_get_without_preload_content( return response_data.response - def _index_openbsd_get_serialize( + def _index_open_cvdb_get_serialize( self, page, limit, @@ -214973,7 +214974,7 @@ def _index_openbsd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openbsd', + resource_path='/v3/index/open-cvdb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -214990,7 +214991,7 @@ def _index_openbsd_get_serialize( @validate_call - def index_opengear_get( + def index_openbsd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215028,10 +215029,10 @@ def index_opengear_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination: - """Return vulnerability data stored in index \"opengear\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination: + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -215103,7 +215104,7 @@ def index_opengear_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215135,7 +215136,7 @@ def index_opengear_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -215151,7 +215152,7 @@ def index_opengear_get( @validate_call - def index_opengear_get_with_http_info( + def index_openbsd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215189,10 +215190,10 @@ def index_opengear_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination]: - """Return vulnerability data stored in index \"opengear\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination]: + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -215264,7 +215265,7 @@ def index_opengear_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215296,7 +215297,7 @@ def index_opengear_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -215312,7 +215313,7 @@ def index_opengear_get_with_http_info( @validate_call - def index_opengear_get_without_preload_content( + def index_openbsd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215351,9 +215352,9 @@ def index_opengear_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"opengear\" + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -215425,7 +215426,7 @@ def index_opengear_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215457,7 +215458,7 @@ def index_opengear_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -215468,7 +215469,7 @@ def index_opengear_get_without_preload_content( return response_data.response - def _index_opengear_get_serialize( + def _index_openbsd_get_serialize( self, page, limit, @@ -215636,7 +215637,7 @@ def _index_opengear_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/opengear', + resource_path='/v3/index/openbsd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -215653,7 +215654,7 @@ def _index_opengear_get_serialize( @validate_call - def index_openjdk_get( + def index_opengear_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215691,10 +215692,10 @@ def index_openjdk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination: - """Return vulnerability data stored in index \"openjdk\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination: + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -215766,7 +215767,7 @@ def index_openjdk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215798,7 +215799,7 @@ def index_openjdk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -215814,7 +215815,7 @@ def index_openjdk_get( @validate_call - def index_openjdk_get_with_http_info( + def index_opengear_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215852,10 +215853,10 @@ def index_openjdk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination]: - """Return vulnerability data stored in index \"openjdk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination]: + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -215927,7 +215928,7 @@ def index_openjdk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215959,7 +215960,7 @@ def index_openjdk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -215975,7 +215976,7 @@ def index_openjdk_get_with_http_info( @validate_call - def index_openjdk_get_without_preload_content( + def index_opengear_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216014,9 +216015,9 @@ def index_openjdk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openjdk\" + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -216088,7 +216089,7 @@ def index_openjdk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216120,7 +216121,7 @@ def index_openjdk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -216131,7 +216132,7 @@ def index_openjdk_get_without_preload_content( return response_data.response - def _index_openjdk_get_serialize( + def _index_opengear_get_serialize( self, page, limit, @@ -216299,7 +216300,7 @@ def _index_openjdk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openjdk', + resource_path='/v3/index/opengear', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -216316,7 +216317,7 @@ def _index_openjdk_get_serialize( @validate_call - def index_openssh_get( + def index_openjdk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216354,10 +216355,10 @@ def index_openssh_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination: - """Return vulnerability data stored in index \"openssh\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination: + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -216429,7 +216430,7 @@ def index_openssh_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216461,7 +216462,7 @@ def index_openssh_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -216477,7 +216478,7 @@ def index_openssh_get( @validate_call - def index_openssh_get_with_http_info( + def index_openjdk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216515,10 +216516,10 @@ def index_openssh_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination]: - """Return vulnerability data stored in index \"openssh\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination]: + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -216590,7 +216591,7 @@ def index_openssh_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216622,7 +216623,7 @@ def index_openssh_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -216638,7 +216639,7 @@ def index_openssh_get_with_http_info( @validate_call - def index_openssh_get_without_preload_content( + def index_openjdk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216677,9 +216678,9 @@ def index_openssh_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openssh\" + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -216751,7 +216752,7 @@ def index_openssh_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216783,7 +216784,7 @@ def index_openssh_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -216794,7 +216795,7 @@ def index_openssh_get_without_preload_content( return response_data.response - def _index_openssh_get_serialize( + def _index_openjdk_get_serialize( self, page, limit, @@ -216962,7 +216963,7 @@ def _index_openssh_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openssh', + resource_path='/v3/index/openjdk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -216979,7 +216980,7 @@ def _index_openssh_get_serialize( @validate_call - def index_openssl_secadv_get( + def index_openssh_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217017,10 +217018,10 @@ def index_openssl_secadv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination: - """Return vulnerability data stored in index \"openssl-secadv\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination: + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -217092,7 +217093,7 @@ def index_openssl_secadv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217124,7 +217125,7 @@ def index_openssl_secadv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -217140,7 +217141,7 @@ def index_openssl_secadv_get( @validate_call - def index_openssl_secadv_get_with_http_info( + def index_openssh_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217178,10 +217179,10 @@ def index_openssl_secadv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination]: - """Return vulnerability data stored in index \"openssl-secadv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination]: + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -217253,7 +217254,7 @@ def index_openssl_secadv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217285,7 +217286,7 @@ def index_openssl_secadv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -217301,7 +217302,7 @@ def index_openssl_secadv_get_with_http_info( @validate_call - def index_openssl_secadv_get_without_preload_content( + def index_openssh_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217340,9 +217341,9 @@ def index_openssl_secadv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openssl-secadv\" + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -217414,7 +217415,7 @@ def index_openssl_secadv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217446,7 +217447,7 @@ def index_openssl_secadv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -217457,7 +217458,7 @@ def index_openssl_secadv_get_without_preload_content( return response_data.response - def _index_openssl_secadv_get_serialize( + def _index_openssh_get_serialize( self, page, limit, @@ -217625,7 +217626,7 @@ def _index_openssl_secadv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openssl-secadv', + resource_path='/v3/index/openssh', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -217642,7 +217643,7 @@ def _index_openssl_secadv_get_serialize( @validate_call - def index_openstack_get( + def index_openssl_secadv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217680,10 +217681,10 @@ def index_openstack_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination: - """Return vulnerability data stored in index \"openstack\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination: + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -217755,7 +217756,7 @@ def index_openstack_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217787,7 +217788,7 @@ def index_openstack_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -217803,7 +217804,7 @@ def index_openstack_get( @validate_call - def index_openstack_get_with_http_info( + def index_openssl_secadv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217841,10 +217842,10 @@ def index_openstack_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination]: - """Return vulnerability data stored in index \"openstack\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination]: + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -217916,7 +217917,7 @@ def index_openstack_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217948,7 +217949,7 @@ def index_openstack_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -217964,7 +217965,7 @@ def index_openstack_get_with_http_info( @validate_call - def index_openstack_get_without_preload_content( + def index_openssl_secadv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218003,9 +218004,9 @@ def index_openstack_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openstack\" + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -218077,7 +218078,7 @@ def index_openstack_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218109,7 +218110,7 @@ def index_openstack_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -218120,7 +218121,7 @@ def index_openstack_get_without_preload_content( return response_data.response - def _index_openstack_get_serialize( + def _index_openssl_secadv_get_serialize( self, page, limit, @@ -218288,7 +218289,7 @@ def _index_openstack_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openstack', + resource_path='/v3/index/openssl-secadv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -218305,7 +218306,7 @@ def _index_openstack_get_serialize( @validate_call - def index_openwrt_get( + def index_openstack_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218343,10 +218344,10 @@ def index_openwrt_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination: - """Return vulnerability data stored in index \"openwrt\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination: + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -218418,7 +218419,7 @@ def index_openwrt_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218450,7 +218451,7 @@ def index_openwrt_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -218466,7 +218467,7 @@ def index_openwrt_get( @validate_call - def index_openwrt_get_with_http_info( + def index_openstack_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218504,10 +218505,10 @@ def index_openwrt_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination]: - """Return vulnerability data stored in index \"openwrt\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination]: + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -218579,7 +218580,7 @@ def index_openwrt_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218611,7 +218612,7 @@ def index_openwrt_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -218627,7 +218628,7 @@ def index_openwrt_get_with_http_info( @validate_call - def index_openwrt_get_without_preload_content( + def index_openstack_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218666,9 +218667,9 @@ def index_openwrt_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openwrt\" + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -218740,7 +218741,7 @@ def index_openwrt_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218772,7 +218773,7 @@ def index_openwrt_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -218783,7 +218784,7 @@ def index_openwrt_get_without_preload_content( return response_data.response - def _index_openwrt_get_serialize( + def _index_openstack_get_serialize( self, page, limit, @@ -218951,7 +218952,7 @@ def _index_openwrt_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openwrt', + resource_path='/v3/index/openstack', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -218968,7 +218969,7 @@ def _index_openwrt_get_serialize( @validate_call - def index_oracle_cpu_csaf_get( + def index_openwrt_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219006,10 +219007,10 @@ def index_oracle_cpu_csaf_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + ) -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination: + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -219081,7 +219082,7 @@ def index_oracle_cpu_csaf_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219113,7 +219114,7 @@ def index_oracle_cpu_csaf_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -219129,7 +219130,7 @@ def index_oracle_cpu_csaf_get( @validate_call - def index_oracle_cpu_csaf_get_with_http_info( + def index_openwrt_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219167,10 +219168,10 @@ def index_oracle_cpu_csaf_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination]: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination]: + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -219242,7 +219243,7 @@ def index_oracle_cpu_csaf_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219274,7 +219275,7 @@ def index_oracle_cpu_csaf_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -219290,7 +219291,7 @@ def index_oracle_cpu_csaf_get_with_http_info( @validate_call - def index_oracle_cpu_csaf_get_without_preload_content( + def index_openwrt_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219329,9 +219330,9 @@ def index_oracle_cpu_csaf_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -219403,7 +219404,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219435,7 +219436,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -219446,7 +219447,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( return response_data.response - def _index_oracle_cpu_csaf_get_serialize( + def _index_openwrt_get_serialize( self, page, limit, @@ -219614,7 +219615,7 @@ def _index_oracle_cpu_csaf_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/oracle-cpu-csaf', + resource_path='/v3/index/openwrt', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -219631,7 +219632,7 @@ def _index_oracle_cpu_csaf_get_serialize( @validate_call - def index_oracle_cpu_get( + def index_oracle_cpu_csaf_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219669,10 +219670,10 @@ def index_oracle_cpu_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination: - """Return vulnerability data stored in index \"oracle-cpu\" + ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination: + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -219744,7 +219745,7 @@ def index_oracle_cpu_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219776,7 +219777,7 @@ def index_oracle_cpu_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -219792,7 +219793,7 @@ def index_oracle_cpu_get( @validate_call - def index_oracle_cpu_get_with_http_info( + def index_oracle_cpu_csaf_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219830,10 +219831,10 @@ def index_oracle_cpu_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination]: - """Return vulnerability data stored in index \"oracle-cpu\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination]: + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -219905,7 +219906,7 @@ def index_oracle_cpu_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219937,7 +219938,7 @@ def index_oracle_cpu_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -219953,7 +219954,7 @@ def index_oracle_cpu_get_with_http_info( @validate_call - def index_oracle_cpu_get_without_preload_content( + def index_oracle_cpu_csaf_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219992,9 +219993,9 @@ def index_oracle_cpu_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle-cpu\" + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -220066,7 +220067,7 @@ def index_oracle_cpu_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220098,7 +220099,7 @@ def index_oracle_cpu_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -220109,7 +220110,7 @@ def index_oracle_cpu_get_without_preload_content( return response_data.response - def _index_oracle_cpu_get_serialize( + def _index_oracle_cpu_csaf_get_serialize( self, page, limit, @@ -220277,7 +220278,7 @@ def _index_oracle_cpu_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/oracle-cpu', + resource_path='/v3/index/oracle-cpu-csaf', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -220294,7 +220295,7 @@ def _index_oracle_cpu_get_serialize( @validate_call - def index_oracle_get( + def index_oracle_cpu_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220332,10 +220333,10 @@ def index_oracle_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination: - """Return vulnerability data stored in index \"oracle\" + ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination: + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -220407,7 +220408,7 @@ def index_oracle_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220439,7 +220440,7 @@ def index_oracle_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -220455,7 +220456,7 @@ def index_oracle_get( @validate_call - def index_oracle_get_with_http_info( + def index_oracle_cpu_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220493,10 +220494,10 @@ def index_oracle_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination]: - """Return vulnerability data stored in index \"oracle\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination]: + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -220568,7 +220569,7 @@ def index_oracle_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220600,7 +220601,7 @@ def index_oracle_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -220616,7 +220617,7 @@ def index_oracle_get_with_http_info( @validate_call - def index_oracle_get_without_preload_content( + def index_oracle_cpu_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220655,9 +220656,9 @@ def index_oracle_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle\" + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -220729,7 +220730,7 @@ def index_oracle_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220761,7 +220762,7 @@ def index_oracle_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -220772,7 +220773,7 @@ def index_oracle_get_without_preload_content( return response_data.response - def _index_oracle_get_serialize( + def _index_oracle_cpu_get_serialize( self, page, limit, @@ -220940,7 +220941,7 @@ def _index_oracle_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/oracle', + resource_path='/v3/index/oracle-cpu', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -220957,7 +220958,7 @@ def _index_oracle_get_serialize( @validate_call - def index_osv_get( + def index_oracle_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220995,10 +220996,10 @@ def index_osv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination: - """Return vulnerability data stored in index \"osv\" + ) -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination: + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -221070,7 +221071,7 @@ def index_osv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221102,7 +221103,7 @@ def index_osv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -221118,7 +221119,7 @@ def index_osv_get( @validate_call - def index_osv_get_with_http_info( + def index_oracle_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221156,10 +221157,10 @@ def index_osv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination]: - """Return vulnerability data stored in index \"osv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination]: + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -221231,7 +221232,7 @@ def index_osv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221263,7 +221264,7 @@ def index_osv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -221279,7 +221280,7 @@ def index_osv_get_with_http_info( @validate_call - def index_osv_get_without_preload_content( + def index_oracle_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221318,9 +221319,9 @@ def index_osv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"osv\" + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -221392,7 +221393,7 @@ def index_osv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221424,7 +221425,7 @@ def index_osv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -221435,7 +221436,7 @@ def index_osv_get_without_preload_content( return response_data.response - def _index_osv_get_serialize( + def _index_oracle_get_serialize( self, page, limit, @@ -221603,7 +221604,7 @@ def _index_osv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/osv', + resource_path='/v3/index/oracle', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -221620,7 +221621,7 @@ def _index_osv_get_serialize( @validate_call - def index_otrs_get( + def index_osv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221658,10 +221659,10 @@ def index_otrs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination: - """Return vulnerability data stored in index \"otrs\" + ) -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination: + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -221733,7 +221734,7 @@ def index_otrs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221765,7 +221766,7 @@ def index_otrs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -221781,7 +221782,7 @@ def index_otrs_get( @validate_call - def index_otrs_get_with_http_info( + def index_osv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221819,10 +221820,10 @@ def index_otrs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination]: - """Return vulnerability data stored in index \"otrs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination]: + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -221894,7 +221895,7 @@ def index_otrs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221926,7 +221927,7 @@ def index_otrs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -221942,7 +221943,7 @@ def index_otrs_get_with_http_info( @validate_call - def index_otrs_get_without_preload_content( + def index_osv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221981,9 +221982,9 @@ def index_otrs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"otrs\" + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -222055,7 +222056,7 @@ def index_otrs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222087,7 +222088,7 @@ def index_otrs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -222098,7 +222099,7 @@ def index_otrs_get_without_preload_content( return response_data.response - def _index_otrs_get_serialize( + def _index_osv_get_serialize( self, page, limit, @@ -222266,7 +222267,7 @@ def _index_otrs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/otrs', + resource_path='/v3/index/osv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -222283,7 +222284,7 @@ def _index_otrs_get_serialize( @validate_call - def index_owncloud_get( + def index_otrs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222321,10 +222322,10 @@ def index_owncloud_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination: - """Return vulnerability data stored in index \"owncloud\" + ) -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination: + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -222396,7 +222397,7 @@ def index_owncloud_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222428,7 +222429,7 @@ def index_owncloud_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -222444,7 +222445,7 @@ def index_owncloud_get( @validate_call - def index_owncloud_get_with_http_info( + def index_otrs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222482,10 +222483,10 @@ def index_owncloud_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination]: - """Return vulnerability data stored in index \"owncloud\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination]: + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -222557,7 +222558,7 @@ def index_owncloud_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222589,7 +222590,7 @@ def index_owncloud_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -222605,7 +222606,7 @@ def index_owncloud_get_with_http_info( @validate_call - def index_owncloud_get_without_preload_content( + def index_otrs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222644,9 +222645,9 @@ def index_owncloud_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"owncloud\" + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -222718,7 +222719,7 @@ def index_owncloud_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222750,7 +222751,7 @@ def index_owncloud_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -222761,7 +222762,7 @@ def index_owncloud_get_without_preload_content( return response_data.response - def _index_owncloud_get_serialize( + def _index_otrs_get_serialize( self, page, limit, @@ -222929,7 +222930,7 @@ def _index_owncloud_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/owncloud', + resource_path='/v3/index/otrs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -222946,7 +222947,7 @@ def _index_owncloud_get_serialize( @validate_call - def index_packetstorm_get( + def index_owncloud_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222984,10 +222985,10 @@ def index_packetstorm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination: - """Return vulnerability data stored in index \"packetstorm\" + ) -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination: + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -223059,7 +223060,7 @@ def index_packetstorm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223091,7 +223092,7 @@ def index_packetstorm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -223107,7 +223108,7 @@ def index_packetstorm_get( @validate_call - def index_packetstorm_get_with_http_info( + def index_owncloud_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223145,10 +223146,10 @@ def index_packetstorm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination]: - """Return vulnerability data stored in index \"packetstorm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination]: + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -223220,7 +223221,7 @@ def index_packetstorm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223252,7 +223253,7 @@ def index_packetstorm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -223268,7 +223269,7 @@ def index_packetstorm_get_with_http_info( @validate_call - def index_packetstorm_get_without_preload_content( + def index_owncloud_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223307,9 +223308,9 @@ def index_packetstorm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"packetstorm\" + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -223381,7 +223382,7 @@ def index_packetstorm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223413,7 +223414,7 @@ def index_packetstorm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -223424,7 +223425,7 @@ def index_packetstorm_get_without_preload_content( return response_data.response - def _index_packetstorm_get_serialize( + def _index_owncloud_get_serialize( self, page, limit, @@ -223592,7 +223593,7 @@ def _index_packetstorm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/packetstorm', + resource_path='/v3/index/owncloud', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -223609,7 +223610,7 @@ def _index_packetstorm_get_serialize( @validate_call - def index_palantir_get( + def index_packetstorm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223647,10 +223648,10 @@ def index_palantir_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination: - """Return vulnerability data stored in index \"palantir\" + ) -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination: + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -223722,7 +223723,7 @@ def index_palantir_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223754,7 +223755,7 @@ def index_palantir_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -223770,7 +223771,7 @@ def index_palantir_get( @validate_call - def index_palantir_get_with_http_info( + def index_packetstorm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223808,10 +223809,10 @@ def index_palantir_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination]: - """Return vulnerability data stored in index \"palantir\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination]: + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -223883,7 +223884,7 @@ def index_palantir_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223915,7 +223916,7 @@ def index_palantir_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -223931,7 +223932,7 @@ def index_palantir_get_with_http_info( @validate_call - def index_palantir_get_without_preload_content( + def index_packetstorm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223970,9 +223971,9 @@ def index_palantir_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"palantir\" + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -224044,7 +224045,7 @@ def index_palantir_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224076,7 +224077,7 @@ def index_palantir_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -224087,7 +224088,7 @@ def index_palantir_get_without_preload_content( return response_data.response - def _index_palantir_get_serialize( + def _index_packetstorm_get_serialize( self, page, limit, @@ -224255,7 +224256,7 @@ def _index_palantir_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/palantir', + resource_path='/v3/index/packetstorm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -224272,7 +224273,7 @@ def _index_palantir_get_serialize( @validate_call - def index_palo_alto_get( + def index_palantir_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224310,10 +224311,10 @@ def index_palo_alto_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"palo-alto\" + ) -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination: + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -224385,7 +224386,7 @@ def index_palo_alto_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224417,7 +224418,7 @@ def index_palo_alto_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -224433,7 +224434,7 @@ def index_palo_alto_get( @validate_call - def index_palo_alto_get_with_http_info( + def index_palantir_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224471,10 +224472,10 @@ def index_palo_alto_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"palo-alto\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination]: + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -224546,7 +224547,7 @@ def index_palo_alto_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224578,7 +224579,7 @@ def index_palo_alto_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -224594,7 +224595,7 @@ def index_palo_alto_get_with_http_info( @validate_call - def index_palo_alto_get_without_preload_content( + def index_palantir_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224633,9 +224634,9 @@ def index_palo_alto_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"palo-alto\" + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -224707,7 +224708,7 @@ def index_palo_alto_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224739,7 +224740,7 @@ def index_palo_alto_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -224750,7 +224751,7 @@ def index_palo_alto_get_without_preload_content( return response_data.response - def _index_palo_alto_get_serialize( + def _index_palantir_get_serialize( self, page, limit, @@ -224918,7 +224919,7 @@ def _index_palo_alto_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/palo-alto', + resource_path='/v3/index/palantir', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -224935,7 +224936,7 @@ def _index_palo_alto_get_serialize( @validate_call - def index_panasonic_get( + def index_palo_alto_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224973,10 +224974,10 @@ def index_panasonic_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination: - """Return vulnerability data stored in index \"panasonic\" + ) -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -225048,7 +225049,7 @@ def index_panasonic_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225080,7 +225081,7 @@ def index_panasonic_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -225096,7 +225097,7 @@ def index_panasonic_get( @validate_call - def index_panasonic_get_with_http_info( + def index_palo_alto_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225134,10 +225135,10 @@ def index_panasonic_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination]: - """Return vulnerability data stored in index \"panasonic\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -225209,7 +225210,7 @@ def index_panasonic_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225241,7 +225242,7 @@ def index_panasonic_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -225257,7 +225258,7 @@ def index_panasonic_get_with_http_info( @validate_call - def index_panasonic_get_without_preload_content( + def index_palo_alto_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225296,9 +225297,9 @@ def index_panasonic_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"panasonic\" + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -225370,7 +225371,7 @@ def index_panasonic_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225402,7 +225403,7 @@ def index_panasonic_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -225413,7 +225414,7 @@ def index_panasonic_get_without_preload_content( return response_data.response - def _index_panasonic_get_serialize( + def _index_palo_alto_get_serialize( self, page, limit, @@ -225581,7 +225582,7 @@ def _index_panasonic_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/panasonic', + resource_path='/v3/index/palo-alto', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -225598,7 +225599,7 @@ def _index_panasonic_get_serialize( @validate_call - def index_papercut_get( + def index_panasonic_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225636,10 +225637,10 @@ def index_papercut_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination: - """Return vulnerability data stored in index \"papercut\" + ) -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination: + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -225711,7 +225712,7 @@ def index_papercut_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225743,7 +225744,7 @@ def index_papercut_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -225759,7 +225760,7 @@ def index_papercut_get( @validate_call - def index_papercut_get_with_http_info( + def index_panasonic_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225797,10 +225798,10 @@ def index_papercut_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination]: - """Return vulnerability data stored in index \"papercut\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination]: + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -225872,7 +225873,7 @@ def index_papercut_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225904,7 +225905,7 @@ def index_papercut_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -225920,7 +225921,7 @@ def index_papercut_get_with_http_info( @validate_call - def index_papercut_get_without_preload_content( + def index_panasonic_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225959,9 +225960,9 @@ def index_papercut_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"papercut\" + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -226033,7 +226034,7 @@ def index_papercut_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226065,7 +226066,7 @@ def index_papercut_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -226076,7 +226077,7 @@ def index_papercut_get_without_preload_content( return response_data.response - def _index_papercut_get_serialize( + def _index_panasonic_get_serialize( self, page, limit, @@ -226244,7 +226245,7 @@ def _index_papercut_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/papercut', + resource_path='/v3/index/panasonic', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -226261,7 +226262,7 @@ def _index_papercut_get_serialize( @validate_call - def index_pega_get( + def index_papercut_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226299,10 +226300,10 @@ def index_pega_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination: - """Return vulnerability data stored in index \"pega\" + ) -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination: + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -226374,7 +226375,7 @@ def index_pega_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226406,7 +226407,7 @@ def index_pega_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -226422,7 +226423,7 @@ def index_pega_get( @validate_call - def index_pega_get_with_http_info( + def index_papercut_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226460,10 +226461,10 @@ def index_pega_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination]: - """Return vulnerability data stored in index \"pega\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination]: + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -226535,7 +226536,7 @@ def index_pega_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226567,7 +226568,7 @@ def index_pega_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -226583,7 +226584,7 @@ def index_pega_get_with_http_info( @validate_call - def index_pega_get_without_preload_content( + def index_papercut_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226622,9 +226623,9 @@ def index_pega_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pega\" + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -226696,7 +226697,7 @@ def index_pega_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226728,7 +226729,7 @@ def index_pega_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -226739,7 +226740,7 @@ def index_pega_get_without_preload_content( return response_data.response - def _index_pega_get_serialize( + def _index_papercut_get_serialize( self, page, limit, @@ -226907,7 +226908,7 @@ def _index_pega_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pega', + resource_path='/v3/index/papercut', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -226924,7 +226925,7 @@ def _index_pega_get_serialize( @validate_call - def index_philips_get( + def index_pega_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226962,10 +226963,10 @@ def index_philips_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"philips\" + ) -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination: + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -227037,7 +227038,7 @@ def index_philips_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227069,7 +227070,7 @@ def index_philips_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -227085,7 +227086,7 @@ def index_philips_get( @validate_call - def index_philips_get_with_http_info( + def index_pega_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227123,10 +227124,10 @@ def index_philips_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"philips\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination]: + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -227198,7 +227199,7 @@ def index_philips_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227230,7 +227231,7 @@ def index_philips_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -227246,7 +227247,7 @@ def index_philips_get_with_http_info( @validate_call - def index_philips_get_without_preload_content( + def index_pega_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227285,9 +227286,9 @@ def index_philips_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"philips\" + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -227359,7 +227360,7 @@ def index_philips_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227391,7 +227392,7 @@ def index_philips_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -227402,7 +227403,7 @@ def index_philips_get_without_preload_content( return response_data.response - def _index_philips_get_serialize( + def _index_pega_get_serialize( self, page, limit, @@ -227570,7 +227571,7 @@ def _index_philips_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/philips', + resource_path='/v3/index/pega', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -227587,7 +227588,7 @@ def _index_philips_get_serialize( @validate_call - def index_phoenix_contact_get( + def index_philips_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227625,10 +227626,10 @@ def index_phoenix_contact_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"phoenix-contact\" + ) -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -227700,7 +227701,7 @@ def index_phoenix_contact_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227732,7 +227733,7 @@ def index_phoenix_contact_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -227748,7 +227749,7 @@ def index_phoenix_contact_get( @validate_call - def index_phoenix_contact_get_with_http_info( + def index_philips_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227786,10 +227787,10 @@ def index_phoenix_contact_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"phoenix-contact\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -227861,7 +227862,7 @@ def index_phoenix_contact_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227893,7 +227894,7 @@ def index_phoenix_contact_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -227909,7 +227910,7 @@ def index_phoenix_contact_get_with_http_info( @validate_call - def index_phoenix_contact_get_without_preload_content( + def index_philips_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227948,9 +227949,9 @@ def index_phoenix_contact_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"phoenix-contact\" + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -228022,7 +228023,7 @@ def index_phoenix_contact_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228054,7 +228055,7 @@ def index_phoenix_contact_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -228065,7 +228066,7 @@ def index_phoenix_contact_get_without_preload_content( return response_data.response - def _index_phoenix_contact_get_serialize( + def _index_philips_get_serialize( self, page, limit, @@ -228233,7 +228234,7 @@ def _index_phoenix_contact_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/phoenix-contact', + resource_path='/v3/index/philips', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -228250,7 +228251,7 @@ def _index_phoenix_contact_get_serialize( @validate_call - def index_php_my_admin_get( + def index_phoenix_contact_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228288,10 +228289,10 @@ def index_php_my_admin_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination: - """Return vulnerability data stored in index \"php-my-admin\" + ) -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -228363,7 +228364,7 @@ def index_php_my_admin_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228395,7 +228396,7 @@ def index_php_my_admin_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -228411,7 +228412,7 @@ def index_php_my_admin_get( @validate_call - def index_php_my_admin_get_with_http_info( + def index_phoenix_contact_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228449,10 +228450,10 @@ def index_php_my_admin_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination]: - """Return vulnerability data stored in index \"php-my-admin\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -228524,7 +228525,7 @@ def index_php_my_admin_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228556,7 +228557,7 @@ def index_php_my_admin_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -228572,7 +228573,7 @@ def index_php_my_admin_get_with_http_info( @validate_call - def index_php_my_admin_get_without_preload_content( + def index_phoenix_contact_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228611,9 +228612,9 @@ def index_php_my_admin_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"php-my-admin\" + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -228685,7 +228686,7 @@ def index_php_my_admin_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228717,7 +228718,7 @@ def index_php_my_admin_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -228728,7 +228729,7 @@ def index_php_my_admin_get_without_preload_content( return response_data.response - def _index_php_my_admin_get_serialize( + def _index_phoenix_contact_get_serialize( self, page, limit, @@ -228896,7 +228897,7 @@ def _index_php_my_admin_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/php-my-admin', + resource_path='/v3/index/phoenix-contact', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -228913,7 +228914,7 @@ def _index_php_my_admin_get_serialize( @validate_call - def index_pkcert_get( + def index_php_my_admin_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228951,10 +228952,10 @@ def index_pkcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination: - """Return vulnerability data stored in index \"pkcert\" + ) -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination: + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -229026,7 +229027,7 @@ def index_pkcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229058,7 +229059,7 @@ def index_pkcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -229074,7 +229075,7 @@ def index_pkcert_get( @validate_call - def index_pkcert_get_with_http_info( + def index_php_my_admin_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229112,10 +229113,10 @@ def index_pkcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination]: - """Return vulnerability data stored in index \"pkcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination]: + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -229187,7 +229188,7 @@ def index_pkcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229219,7 +229220,7 @@ def index_pkcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -229235,7 +229236,7 @@ def index_pkcert_get_with_http_info( @validate_call - def index_pkcert_get_without_preload_content( + def index_php_my_admin_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229274,9 +229275,9 @@ def index_pkcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pkcert\" + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -229348,7 +229349,7 @@ def index_pkcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229380,7 +229381,7 @@ def index_pkcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -229391,7 +229392,7 @@ def index_pkcert_get_without_preload_content( return response_data.response - def _index_pkcert_get_serialize( + def _index_php_my_admin_get_serialize( self, page, limit, @@ -229559,7 +229560,7 @@ def _index_pkcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pkcert', + resource_path='/v3/index/php-my-admin', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -229576,7 +229577,7 @@ def _index_pkcert_get_serialize( @validate_call - def index_postgressql_get( + def index_pkcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229614,10 +229615,10 @@ def index_postgressql_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination: - """Return vulnerability data stored in index \"postgressql\" + ) -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination: + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -229689,7 +229690,7 @@ def index_postgressql_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229721,7 +229722,7 @@ def index_postgressql_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -229737,7 +229738,7 @@ def index_postgressql_get( @validate_call - def index_postgressql_get_with_http_info( + def index_pkcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229775,10 +229776,10 @@ def index_postgressql_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination]: - """Return vulnerability data stored in index \"postgressql\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination]: + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -229850,7 +229851,7 @@ def index_postgressql_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229882,7 +229883,7 @@ def index_postgressql_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -229898,7 +229899,7 @@ def index_postgressql_get_with_http_info( @validate_call - def index_postgressql_get_without_preload_content( + def index_pkcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229937,9 +229938,9 @@ def index_postgressql_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"postgressql\" + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -230011,7 +230012,7 @@ def index_postgressql_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230043,7 +230044,7 @@ def index_postgressql_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -230054,7 +230055,7 @@ def index_postgressql_get_without_preload_content( return response_data.response - def _index_postgressql_get_serialize( + def _index_pkcert_get_serialize( self, page, limit, @@ -230222,7 +230223,7 @@ def _index_postgressql_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/postgressql', + resource_path='/v3/index/pkcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -230239,7 +230240,7 @@ def _index_postgressql_get_serialize( @validate_call - def index_powerdns_get( + def index_postgressql_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230277,10 +230278,10 @@ def index_powerdns_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination: - """Return vulnerability data stored in index \"powerdns\" + ) -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination: + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -230352,7 +230353,7 @@ def index_powerdns_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230384,7 +230385,7 @@ def index_powerdns_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -230400,7 +230401,7 @@ def index_powerdns_get( @validate_call - def index_powerdns_get_with_http_info( + def index_postgressql_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230438,10 +230439,10 @@ def index_powerdns_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination]: - """Return vulnerability data stored in index \"powerdns\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination]: + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -230513,7 +230514,7 @@ def index_powerdns_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230545,7 +230546,7 @@ def index_powerdns_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -230561,7 +230562,7 @@ def index_powerdns_get_with_http_info( @validate_call - def index_powerdns_get_without_preload_content( + def index_postgressql_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230600,9 +230601,9 @@ def index_powerdns_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"powerdns\" + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -230674,7 +230675,7 @@ def index_powerdns_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230706,7 +230707,7 @@ def index_powerdns_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -230717,7 +230718,7 @@ def index_powerdns_get_without_preload_content( return response_data.response - def _index_powerdns_get_serialize( + def _index_postgressql_get_serialize( self, page, limit, @@ -230885,7 +230886,7 @@ def _index_powerdns_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/powerdns', + resource_path='/v3/index/postgressql', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -230902,7 +230903,7 @@ def _index_powerdns_get_serialize( @validate_call - def index_progress_get( + def index_powerdns_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230940,10 +230941,10 @@ def index_progress_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination: - """Return vulnerability data stored in index \"progress\" + ) -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination: + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -231015,7 +231016,7 @@ def index_progress_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231047,7 +231048,7 @@ def index_progress_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -231063,7 +231064,7 @@ def index_progress_get( @validate_call - def index_progress_get_with_http_info( + def index_powerdns_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231101,10 +231102,10 @@ def index_progress_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination]: - """Return vulnerability data stored in index \"progress\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination]: + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -231176,7 +231177,7 @@ def index_progress_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231208,7 +231209,7 @@ def index_progress_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -231224,7 +231225,7 @@ def index_progress_get_with_http_info( @validate_call - def index_progress_get_without_preload_content( + def index_powerdns_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231263,9 +231264,9 @@ def index_progress_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"progress\" + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -231337,7 +231338,7 @@ def index_progress_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231369,7 +231370,7 @@ def index_progress_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -231380,7 +231381,7 @@ def index_progress_get_without_preload_content( return response_data.response - def _index_progress_get_serialize( + def _index_powerdns_get_serialize( self, page, limit, @@ -231548,7 +231549,7 @@ def _index_progress_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/progress', + resource_path='/v3/index/powerdns', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -231565,7 +231566,7 @@ def _index_progress_get_serialize( @validate_call - def index_proofpoint_get( + def index_progress_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231603,10 +231604,10 @@ def index_proofpoint_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination: - """Return vulnerability data stored in index \"proofpoint\" + ) -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination: + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -231678,7 +231679,7 @@ def index_proofpoint_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231710,7 +231711,7 @@ def index_proofpoint_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -231726,7 +231727,7 @@ def index_proofpoint_get( @validate_call - def index_proofpoint_get_with_http_info( + def index_progress_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231764,10 +231765,10 @@ def index_proofpoint_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination]: - """Return vulnerability data stored in index \"proofpoint\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination]: + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -231839,7 +231840,7 @@ def index_proofpoint_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231871,7 +231872,7 @@ def index_proofpoint_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -231887,7 +231888,7 @@ def index_proofpoint_get_with_http_info( @validate_call - def index_proofpoint_get_without_preload_content( + def index_progress_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231926,9 +231927,9 @@ def index_proofpoint_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"proofpoint\" + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -232000,7 +232001,7 @@ def index_proofpoint_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232032,7 +232033,7 @@ def index_proofpoint_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -232043,7 +232044,7 @@ def index_proofpoint_get_without_preload_content( return response_data.response - def _index_proofpoint_get_serialize( + def _index_progress_get_serialize( self, page, limit, @@ -232211,7 +232212,7 @@ def _index_proofpoint_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/proofpoint', + resource_path='/v3/index/progress', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -232228,7 +232229,7 @@ def _index_proofpoint_get_serialize( @validate_call - def index_ptc_get( + def index_proofpoint_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232266,10 +232267,10 @@ def index_ptc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination: - """Return vulnerability data stored in index \"ptc\" + ) -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination: + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -232341,7 +232342,7 @@ def index_ptc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232373,7 +232374,7 @@ def index_ptc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -232389,7 +232390,7 @@ def index_ptc_get( @validate_call - def index_ptc_get_with_http_info( + def index_proofpoint_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232427,10 +232428,10 @@ def index_ptc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination]: - """Return vulnerability data stored in index \"ptc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination]: + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -232502,7 +232503,7 @@ def index_ptc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232534,7 +232535,7 @@ def index_ptc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -232550,7 +232551,7 @@ def index_ptc_get_with_http_info( @validate_call - def index_ptc_get_without_preload_content( + def index_proofpoint_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232589,9 +232590,9 @@ def index_ptc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ptc\" + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -232663,7 +232664,7 @@ def index_ptc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232695,7 +232696,7 @@ def index_ptc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -232706,7 +232707,7 @@ def index_ptc_get_without_preload_content( return response_data.response - def _index_ptc_get_serialize( + def _index_proofpoint_get_serialize( self, page, limit, @@ -232874,7 +232875,7 @@ def _index_ptc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ptc', + resource_path='/v3/index/proofpoint', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -232891,7 +232892,7 @@ def _index_ptc_get_serialize( @validate_call - def index_pub_get( + def index_ptc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232929,10 +232930,10 @@ def index_pub_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"pub\" + ) -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination: + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -233004,7 +233005,7 @@ def index_pub_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233036,7 +233037,7 @@ def index_pub_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -233052,7 +233053,7 @@ def index_pub_get( @validate_call - def index_pub_get_with_http_info( + def index_ptc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233090,10 +233091,10 @@ def index_pub_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"pub\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination]: + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -233165,7 +233166,7 @@ def index_pub_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233197,7 +233198,7 @@ def index_pub_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -233213,7 +233214,7 @@ def index_pub_get_with_http_info( @validate_call - def index_pub_get_without_preload_content( + def index_ptc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233252,9 +233253,9 @@ def index_pub_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pub\" + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -233326,7 +233327,7 @@ def index_pub_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233358,7 +233359,7 @@ def index_pub_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -233369,7 +233370,7 @@ def index_pub_get_without_preload_content( return response_data.response - def _index_pub_get_serialize( + def _index_ptc_get_serialize( self, page, limit, @@ -233537,7 +233538,7 @@ def _index_pub_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pub', + resource_path='/v3/index/ptc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -233554,7 +233555,7 @@ def _index_pub_get_serialize( @validate_call - def index_pure_storage_get( + def index_pub_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233592,10 +233593,10 @@ def index_pure_storage_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination: - """Return vulnerability data stored in index \"pure-storage\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -233667,7 +233668,7 @@ def index_pure_storage_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233699,7 +233700,7 @@ def index_pure_storage_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -233715,7 +233716,7 @@ def index_pure_storage_get( @validate_call - def index_pure_storage_get_with_http_info( + def index_pub_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233753,10 +233754,10 @@ def index_pure_storage_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination]: - """Return vulnerability data stored in index \"pure-storage\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -233828,7 +233829,7 @@ def index_pure_storage_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233860,7 +233861,7 @@ def index_pure_storage_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -233876,7 +233877,7 @@ def index_pure_storage_get_with_http_info( @validate_call - def index_pure_storage_get_without_preload_content( + def index_pub_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233915,9 +233916,9 @@ def index_pure_storage_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pure-storage\" + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -233989,7 +233990,7 @@ def index_pure_storage_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234021,7 +234022,7 @@ def index_pure_storage_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -234032,7 +234033,7 @@ def index_pure_storage_get_without_preload_content( return response_data.response - def _index_pure_storage_get_serialize( + def _index_pub_get_serialize( self, page, limit, @@ -234200,7 +234201,7 @@ def _index_pure_storage_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pure-storage', + resource_path='/v3/index/pub', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -234217,7 +234218,7 @@ def _index_pure_storage_get_serialize( @validate_call - def index_pypa_advisories_get( + def index_pure_storage_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234255,10 +234256,10 @@ def index_pypa_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"pypa-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination: + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -234330,7 +234331,7 @@ def index_pypa_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234362,7 +234363,7 @@ def index_pypa_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -234378,7 +234379,7 @@ def index_pypa_advisories_get( @validate_call - def index_pypa_advisories_get_with_http_info( + def index_pure_storage_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234416,10 +234417,10 @@ def index_pypa_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"pypa-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination]: + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -234491,7 +234492,7 @@ def index_pypa_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234523,7 +234524,7 @@ def index_pypa_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -234539,7 +234540,7 @@ def index_pypa_advisories_get_with_http_info( @validate_call - def index_pypa_advisories_get_without_preload_content( + def index_pure_storage_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234578,9 +234579,9 @@ def index_pypa_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pypa-advisories\" + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -234652,7 +234653,7 @@ def index_pypa_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234684,7 +234685,7 @@ def index_pypa_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -234695,7 +234696,7 @@ def index_pypa_advisories_get_without_preload_content( return response_data.response - def _index_pypa_advisories_get_serialize( + def _index_pure_storage_get_serialize( self, page, limit, @@ -234863,7 +234864,7 @@ def _index_pypa_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pypa-advisories', + resource_path='/v3/index/pure-storage', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -234880,7 +234881,7 @@ def _index_pypa_advisories_get_serialize( @validate_call - def index_pypi_get( + def index_pypa_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234918,10 +234919,10 @@ def index_pypi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"pypi\" + ) -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -234993,7 +234994,7 @@ def index_pypi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235025,7 +235026,7 @@ def index_pypi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -235041,7 +235042,7 @@ def index_pypi_get( @validate_call - def index_pypi_get_with_http_info( + def index_pypa_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235079,10 +235080,10 @@ def index_pypi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"pypi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -235154,7 +235155,7 @@ def index_pypi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235186,7 +235187,7 @@ def index_pypi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -235202,7 +235203,7 @@ def index_pypi_get_with_http_info( @validate_call - def index_pypi_get_without_preload_content( + def index_pypa_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235241,9 +235242,9 @@ def index_pypi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pypi\" + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -235315,7 +235316,7 @@ def index_pypi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235347,7 +235348,7 @@ def index_pypi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -235358,7 +235359,7 @@ def index_pypi_get_without_preload_content( return response_data.response - def _index_pypi_get_serialize( + def _index_pypa_advisories_get_serialize( self, page, limit, @@ -235526,7 +235527,7 @@ def _index_pypi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pypi', + resource_path='/v3/index/pypa-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -235543,7 +235544,7 @@ def _index_pypi_get_serialize( @validate_call - def index_qnap_get( + def index_pypi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235581,10 +235582,10 @@ def index_qnap_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"qnap\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -235656,7 +235657,7 @@ def index_qnap_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235688,7 +235689,7 @@ def index_qnap_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -235704,7 +235705,7 @@ def index_qnap_get( @validate_call - def index_qnap_get_with_http_info( + def index_pypi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235742,10 +235743,10 @@ def index_qnap_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"qnap\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -235817,7 +235818,7 @@ def index_qnap_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235849,7 +235850,7 @@ def index_qnap_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -235865,7 +235866,7 @@ def index_qnap_get_with_http_info( @validate_call - def index_qnap_get_without_preload_content( + def index_pypi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235904,9 +235905,9 @@ def index_qnap_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qnap\" + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -235978,7 +235979,7 @@ def index_qnap_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236010,7 +236011,7 @@ def index_qnap_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -236021,7 +236022,7 @@ def index_qnap_get_without_preload_content( return response_data.response - def _index_qnap_get_serialize( + def _index_pypi_get_serialize( self, page, limit, @@ -236189,7 +236190,7 @@ def _index_qnap_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qnap', + resource_path='/v3/index/pypi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -236206,7 +236207,7 @@ def _index_qnap_get_serialize( @validate_call - def index_qqids_get( + def index_qnap_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236244,10 +236245,10 @@ def index_qqids_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination: - """Return vulnerability data stored in index \"qqids\" + ) -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -236319,7 +236320,7 @@ def index_qqids_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236351,7 +236352,7 @@ def index_qqids_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -236367,7 +236368,7 @@ def index_qqids_get( @validate_call - def index_qqids_get_with_http_info( + def index_qnap_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236405,10 +236406,10 @@ def index_qqids_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination]: - """Return vulnerability data stored in index \"qqids\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -236480,7 +236481,7 @@ def index_qqids_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236512,7 +236513,7 @@ def index_qqids_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -236528,7 +236529,7 @@ def index_qqids_get_with_http_info( @validate_call - def index_qqids_get_without_preload_content( + def index_qnap_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236567,9 +236568,9 @@ def index_qqids_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qqids\" + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -236641,7 +236642,7 @@ def index_qqids_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236673,7 +236674,7 @@ def index_qqids_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -236684,7 +236685,7 @@ def index_qqids_get_without_preload_content( return response_data.response - def _index_qqids_get_serialize( + def _index_qnap_get_serialize( self, page, limit, @@ -236852,7 +236853,7 @@ def _index_qqids_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qqids', + resource_path='/v3/index/qnap', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -236869,7 +236870,7 @@ def _index_qqids_get_serialize( @validate_call - def index_qualcomm_get( + def index_qqids_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236907,10 +236908,10 @@ def index_qualcomm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination: - """Return vulnerability data stored in index \"qualcomm\" + ) -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination: + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -236982,7 +236983,7 @@ def index_qualcomm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237014,7 +237015,7 @@ def index_qualcomm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -237030,7 +237031,7 @@ def index_qualcomm_get( @validate_call - def index_qualcomm_get_with_http_info( + def index_qqids_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237068,10 +237069,10 @@ def index_qualcomm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination]: - """Return vulnerability data stored in index \"qualcomm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination]: + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -237143,7 +237144,7 @@ def index_qualcomm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237175,7 +237176,7 @@ def index_qualcomm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -237191,7 +237192,7 @@ def index_qualcomm_get_with_http_info( @validate_call - def index_qualcomm_get_without_preload_content( + def index_qqids_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237230,9 +237231,9 @@ def index_qualcomm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualcomm\" + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -237304,7 +237305,7 @@ def index_qualcomm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237336,7 +237337,7 @@ def index_qualcomm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -237347,7 +237348,7 @@ def index_qualcomm_get_without_preload_content( return response_data.response - def _index_qualcomm_get_serialize( + def _index_qqids_get_serialize( self, page, limit, @@ -237515,7 +237516,7 @@ def _index_qualcomm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qualcomm', + resource_path='/v3/index/qqids', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -237532,7 +237533,7 @@ def _index_qualcomm_get_serialize( @validate_call - def index_qualys_get( + def index_qualcomm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237570,10 +237571,10 @@ def index_qualys_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination: - """Return vulnerability data stored in index \"qualys\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination: + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -237645,7 +237646,7 @@ def index_qualys_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237677,7 +237678,7 @@ def index_qualys_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -237693,7 +237694,7 @@ def index_qualys_get( @validate_call - def index_qualys_get_with_http_info( + def index_qualcomm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237731,10 +237732,10 @@ def index_qualys_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination]: - """Return vulnerability data stored in index \"qualys\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination]: + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -237806,7 +237807,7 @@ def index_qualys_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237838,7 +237839,7 @@ def index_qualys_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -237854,7 +237855,7 @@ def index_qualys_get_with_http_info( @validate_call - def index_qualys_get_without_preload_content( + def index_qualcomm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237893,9 +237894,9 @@ def index_qualys_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualys\" + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -237967,7 +237968,7 @@ def index_qualys_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237999,7 +238000,7 @@ def index_qualys_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -238010,7 +238011,7 @@ def index_qualys_get_without_preload_content( return response_data.response - def _index_qualys_get_serialize( + def _index_qualcomm_get_serialize( self, page, limit, @@ -238178,7 +238179,7 @@ def _index_qualys_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qualys', + resource_path='/v3/index/qualcomm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -238195,7 +238196,7 @@ def _index_qualys_get_serialize( @validate_call - def index_qualys_qids_get( + def index_qualys_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238233,10 +238234,10 @@ def index_qualys_qids_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination: - """Return vulnerability data stored in index \"qualys-qids\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination: + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -238308,7 +238309,7 @@ def index_qualys_qids_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238340,7 +238341,7 @@ def index_qualys_qids_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -238356,7 +238357,7 @@ def index_qualys_qids_get( @validate_call - def index_qualys_qids_get_with_http_info( + def index_qualys_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238394,10 +238395,10 @@ def index_qualys_qids_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination]: - """Return vulnerability data stored in index \"qualys-qids\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination]: + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -238469,7 +238470,7 @@ def index_qualys_qids_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238501,7 +238502,7 @@ def index_qualys_qids_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -238517,7 +238518,7 @@ def index_qualys_qids_get_with_http_info( @validate_call - def index_qualys_qids_get_without_preload_content( + def index_qualys_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238556,9 +238557,9 @@ def index_qualys_qids_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualys-qids\" + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -238630,7 +238631,7 @@ def index_qualys_qids_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238662,7 +238663,7 @@ def index_qualys_qids_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -238673,7 +238674,7 @@ def index_qualys_qids_get_without_preload_content( return response_data.response - def _index_qualys_qids_get_serialize( + def _index_qualys_get_serialize( self, page, limit, @@ -238841,7 +238842,7 @@ def _index_qualys_qids_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qualys-qids', + resource_path='/v3/index/qualys', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -238858,7 +238859,7 @@ def _index_qualys_qids_get_serialize( @validate_call - def index_qubes_qsb_get( + def index_qualys_qids_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238896,10 +238897,10 @@ def index_qubes_qsb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination: - """Return vulnerability data stored in index \"qubes-qsb\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination: + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -238971,7 +238972,7 @@ def index_qubes_qsb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239003,7 +239004,7 @@ def index_qubes_qsb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -239019,7 +239020,7 @@ def index_qubes_qsb_get( @validate_call - def index_qubes_qsb_get_with_http_info( + def index_qualys_qids_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239057,10 +239058,10 @@ def index_qubes_qsb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination]: - """Return vulnerability data stored in index \"qubes-qsb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination]: + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -239132,7 +239133,7 @@ def index_qubes_qsb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239164,7 +239165,7 @@ def index_qubes_qsb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -239180,7 +239181,7 @@ def index_qubes_qsb_get_with_http_info( @validate_call - def index_qubes_qsb_get_without_preload_content( + def index_qualys_qids_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239219,9 +239220,9 @@ def index_qubes_qsb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qubes-qsb\" + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -239293,7 +239294,7 @@ def index_qubes_qsb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239325,7 +239326,7 @@ def index_qubes_qsb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -239336,7 +239337,7 @@ def index_qubes_qsb_get_without_preload_content( return response_data.response - def _index_qubes_qsb_get_serialize( + def _index_qualys_qids_get_serialize( self, page, limit, @@ -239504,7 +239505,7 @@ def _index_qubes_qsb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qubes-qsb', + resource_path='/v3/index/qualys-qids', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -239521,7 +239522,7 @@ def _index_qubes_qsb_get_serialize( @validate_call - def index_ransomware_get( + def index_qubes_qsb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239559,10 +239560,10 @@ def index_ransomware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination: - """Return vulnerability data stored in index \"ransomware\" + ) -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination: + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -239634,7 +239635,7 @@ def index_ransomware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239666,7 +239667,7 @@ def index_ransomware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -239682,7 +239683,7 @@ def index_ransomware_get( @validate_call - def index_ransomware_get_with_http_info( + def index_qubes_qsb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239720,10 +239721,10 @@ def index_ransomware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination]: - """Return vulnerability data stored in index \"ransomware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination]: + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -239795,7 +239796,7 @@ def index_ransomware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239827,7 +239828,7 @@ def index_ransomware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -239843,7 +239844,7 @@ def index_ransomware_get_with_http_info( @validate_call - def index_ransomware_get_without_preload_content( + def index_qubes_qsb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239882,9 +239883,9 @@ def index_ransomware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ransomware\" + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -239956,7 +239957,7 @@ def index_ransomware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239988,7 +239989,7 @@ def index_ransomware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -239999,7 +240000,7 @@ def index_ransomware_get_without_preload_content( return response_data.response - def _index_ransomware_get_serialize( + def _index_qubes_qsb_get_serialize( self, page, limit, @@ -240167,7 +240168,7 @@ def _index_ransomware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ransomware', + resource_path='/v3/index/qubes-qsb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -240184,7 +240185,7 @@ def _index_ransomware_get_serialize( @validate_call - def index_red_lion_get( + def index_ransomware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240222,10 +240223,10 @@ def index_red_lion_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination: - """Return vulnerability data stored in index \"red-lion\" + ) -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination: + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -240297,7 +240298,7 @@ def index_red_lion_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_red_lion_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240329,7 +240330,7 @@ def index_red_lion_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -240345,7 +240346,7 @@ def index_red_lion_get( @validate_call - def index_red_lion_get_with_http_info( + def index_ransomware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240383,10 +240384,10 @@ def index_red_lion_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination]: - """Return vulnerability data stored in index \"red-lion\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination]: + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -240458,7 +240459,7 @@ def index_red_lion_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_red_lion_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240490,7 +240491,7 @@ def index_red_lion_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -240506,7 +240507,7 @@ def index_red_lion_get_with_http_info( @validate_call - def index_red_lion_get_without_preload_content( + def index_ransomware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240545,9 +240546,9 @@ def index_red_lion_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"red-lion\" + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -240619,7 +240620,7 @@ def index_red_lion_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_red_lion_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240651,7 +240652,7 @@ def index_red_lion_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -240662,7 +240663,7 @@ def index_red_lion_get_without_preload_content( return response_data.response - def _index_red_lion_get_serialize( + def _index_ransomware_get_serialize( self, page, limit, @@ -240830,7 +240831,7 @@ def _index_red_lion_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/red-lion', + resource_path='/v3/index/ransomware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -240847,7 +240848,7 @@ def _index_red_lion_get_serialize( @validate_call - def index_redhat_cves_get( + def index_red_lion_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240885,10 +240886,10 @@ def index_redhat_cves_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination: - """Return vulnerability data stored in index \"redhat-cves\" + ) -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination: + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -240960,7 +240961,7 @@ def index_redhat_cves_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_cves_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240992,7 +240993,7 @@ def index_redhat_cves_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -241008,7 +241009,7 @@ def index_redhat_cves_get( @validate_call - def index_redhat_cves_get_with_http_info( + def index_red_lion_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241046,10 +241047,10 @@ def index_redhat_cves_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination]: - """Return vulnerability data stored in index \"redhat-cves\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination]: + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -241121,7 +241122,7 @@ def index_redhat_cves_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_cves_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241153,7 +241154,7 @@ def index_redhat_cves_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -241169,7 +241170,7 @@ def index_redhat_cves_get_with_http_info( @validate_call - def index_redhat_cves_get_without_preload_content( + def index_red_lion_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241208,9 +241209,9 @@ def index_redhat_cves_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"redhat-cves\" + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -241282,7 +241283,7 @@ def index_redhat_cves_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_cves_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241314,7 +241315,7 @@ def index_redhat_cves_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -241325,7 +241326,7 @@ def index_redhat_cves_get_without_preload_content( return response_data.response - def _index_redhat_cves_get_serialize( + def _index_red_lion_get_serialize( self, page, limit, @@ -241493,7 +241494,7 @@ def _index_redhat_cves_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/redhat-cves', + resource_path='/v3/index/red-lion', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -241510,7 +241511,7 @@ def _index_redhat_cves_get_serialize( @validate_call - def index_redhat_get( + def index_redhat_cves_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241548,10 +241549,10 @@ def index_redhat_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination: - """Return vulnerability data stored in index \"redhat\" + ) -> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination: + """Return vulnerability data stored in index \"redhat-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` :param page: set the page number of the response :type page: int @@ -241623,7 +241624,7 @@ def index_redhat_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_get_serialize( + _param = self._index_redhat_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241655,7 +241656,7 @@ def index_redhat_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", '404': "str", '500': "str", } @@ -241671,7 +241672,7 @@ def index_redhat_get( @validate_call - def index_redhat_get_with_http_info( + def index_redhat_cves_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241709,10 +241710,10 @@ def index_redhat_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination]: - """Return vulnerability data stored in index \"redhat\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination]: + """Return vulnerability data stored in index \"redhat-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` :param page: set the page number of the response :type page: int @@ -241784,7 +241785,7 @@ def index_redhat_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_get_serialize( + _param = self._index_redhat_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241816,7 +241817,7 @@ def index_redhat_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", '404': "str", '500': "str", } @@ -241832,7 +241833,7 @@ def index_redhat_get_with_http_info( @validate_call - def index_redhat_get_without_preload_content( + def index_redhat_cves_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241871,9 +241872,9 @@ def index_redhat_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"redhat\" + """Return vulnerability data stored in index \"redhat-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` :param page: set the page number of the response :type page: int @@ -241945,7 +241946,7 @@ def index_redhat_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_get_serialize( + _param = self._index_redhat_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241977,7 +241978,7 @@ def index_redhat_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", '404': "str", '500': "str", } @@ -241988,7 +241989,7 @@ def index_redhat_get_without_preload_content( return response_data.response - def _index_redhat_get_serialize( + def _index_redhat_cves_get_serialize( self, page, limit, @@ -242156,7 +242157,7 @@ def _index_redhat_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/redhat', + resource_path='/v3/index/redhat-cves', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -242173,7 +242174,7 @@ def _index_redhat_get_serialize( @validate_call - def index_renesas_get( + def index_redhat_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242211,10 +242212,10 @@ def index_renesas_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination: - """Return vulnerability data stored in index \"renesas\" + ) -> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination: + """Return vulnerability data stored in index \"redhat\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` :param page: set the page number of the response :type page: int @@ -242286,7 +242287,7 @@ def index_renesas_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_renesas_get_serialize( + _param = self._index_redhat_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242318,7 +242319,7 @@ def index_renesas_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", '404': "str", '500': "str", } @@ -242334,7 +242335,7 @@ def index_renesas_get( @validate_call - def index_renesas_get_with_http_info( + def index_redhat_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242372,10 +242373,10 @@ def index_renesas_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination]: - """Return vulnerability data stored in index \"renesas\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination]: + """Return vulnerability data stored in index \"redhat\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` :param page: set the page number of the response :type page: int @@ -242447,7 +242448,7 @@ def index_renesas_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_renesas_get_serialize( + _param = self._index_redhat_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242479,7 +242480,7 @@ def index_renesas_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", '404': "str", '500': "str", } @@ -242495,7 +242496,7 @@ def index_renesas_get_with_http_info( @validate_call - def index_renesas_get_without_preload_content( + def index_redhat_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242534,9 +242535,9 @@ def index_renesas_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"renesas\" + """Return vulnerability data stored in index \"redhat\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` :param page: set the page number of the response :type page: int @@ -242608,7 +242609,7 @@ def index_renesas_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_renesas_get_serialize( + _param = self._index_redhat_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242640,7 +242641,7 @@ def index_renesas_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", '404': "str", '500': "str", } @@ -242651,7 +242652,7 @@ def index_renesas_get_without_preload_content( return response_data.response - def _index_renesas_get_serialize( + def _index_redhat_get_serialize( self, page, limit, @@ -242819,7 +242820,7 @@ def _index_renesas_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/renesas', + resource_path='/v3/index/redhat', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -242836,7 +242837,7 @@ def _index_renesas_get_serialize( @validate_call - def index_revive_get( + def index_renesas_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242874,10 +242875,10 @@ def index_revive_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination: - """Return vulnerability data stored in index \"revive\" + ) -> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination: + """Return vulnerability data stored in index \"renesas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` :param page: set the page number of the response :type page: int @@ -242949,7 +242950,7 @@ def index_revive_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_revive_get_serialize( + _param = self._index_renesas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242981,7 +242982,7 @@ def index_revive_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", '404': "str", '500': "str", } @@ -242997,7 +242998,7 @@ def index_revive_get( @validate_call - def index_revive_get_with_http_info( + def index_renesas_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243035,10 +243036,10 @@ def index_revive_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination]: - """Return vulnerability data stored in index \"revive\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination]: + """Return vulnerability data stored in index \"renesas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` :param page: set the page number of the response :type page: int @@ -243110,7 +243111,7 @@ def index_revive_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_revive_get_serialize( + _param = self._index_renesas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243142,7 +243143,7 @@ def index_revive_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", '404': "str", '500': "str", } @@ -243158,7 +243159,7 @@ def index_revive_get_with_http_info( @validate_call - def index_revive_get_without_preload_content( + def index_renesas_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243197,9 +243198,9 @@ def index_revive_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"revive\" + """Return vulnerability data stored in index \"renesas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` :param page: set the page number of the response :type page: int @@ -243271,7 +243272,7 @@ def index_revive_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_revive_get_serialize( + _param = self._index_renesas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243303,7 +243304,7 @@ def index_revive_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", '404': "str", '500': "str", } @@ -243314,7 +243315,7 @@ def index_revive_get_without_preload_content( return response_data.response - def _index_revive_get_serialize( + def _index_renesas_get_serialize( self, page, limit, @@ -243482,7 +243483,7 @@ def _index_revive_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/revive', + resource_path='/v3/index/renesas', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -243499,7 +243500,7 @@ def _index_revive_get_serialize( @validate_call - def index_roche_get( + def index_revive_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243537,10 +243538,10 @@ def index_roche_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination: - """Return vulnerability data stored in index \"roche\" + ) -> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination: + """Return vulnerability data stored in index \"revive\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` :param page: set the page number of the response :type page: int @@ -243612,7 +243613,7 @@ def index_roche_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_roche_get_serialize( + _param = self._index_revive_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243644,7 +243645,7 @@ def index_roche_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", '404': "str", '500': "str", } @@ -243660,7 +243661,7 @@ def index_roche_get( @validate_call - def index_roche_get_with_http_info( + def index_revive_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243698,10 +243699,10 @@ def index_roche_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination]: - """Return vulnerability data stored in index \"roche\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination]: + """Return vulnerability data stored in index \"revive\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` :param page: set the page number of the response :type page: int @@ -243773,7 +243774,7 @@ def index_roche_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_roche_get_serialize( + _param = self._index_revive_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243805,7 +243806,7 @@ def index_roche_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", '404': "str", '500': "str", } @@ -243821,7 +243822,7 @@ def index_roche_get_with_http_info( @validate_call - def index_roche_get_without_preload_content( + def index_revive_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243860,9 +243861,9 @@ def index_roche_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"roche\" + """Return vulnerability data stored in index \"revive\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` :param page: set the page number of the response :type page: int @@ -243934,7 +243935,7 @@ def index_roche_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_roche_get_serialize( + _param = self._index_revive_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243966,7 +243967,7 @@ def index_roche_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", '404': "str", '500': "str", } @@ -243977,7 +243978,7 @@ def index_roche_get_without_preload_content( return response_data.response - def _index_roche_get_serialize( + def _index_revive_get_serialize( self, page, limit, @@ -244145,7 +244146,7 @@ def _index_roche_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/roche', + resource_path='/v3/index/revive', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -244162,7 +244163,7 @@ def _index_roche_get_serialize( @validate_call - def index_rockwell_get( + def index_roche_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244200,10 +244201,10 @@ def index_rockwell_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination: - """Return vulnerability data stored in index \"rockwell\" + ) -> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination: + """Return vulnerability data stored in index \"roche\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` :param page: set the page number of the response :type page: int @@ -244275,7 +244276,7 @@ def index_rockwell_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rockwell_get_serialize( + _param = self._index_roche_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244307,7 +244308,7 @@ def index_rockwell_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", '404': "str", '500': "str", } @@ -244323,7 +244324,7 @@ def index_rockwell_get( @validate_call - def index_rockwell_get_with_http_info( + def index_roche_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244361,10 +244362,10 @@ def index_rockwell_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination]: - """Return vulnerability data stored in index \"rockwell\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination]: + """Return vulnerability data stored in index \"roche\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` :param page: set the page number of the response :type page: int @@ -244436,7 +244437,7 @@ def index_rockwell_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rockwell_get_serialize( + _param = self._index_roche_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244468,7 +244469,7 @@ def index_rockwell_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", '404': "str", '500': "str", } @@ -244484,7 +244485,7 @@ def index_rockwell_get_with_http_info( @validate_call - def index_rockwell_get_without_preload_content( + def index_roche_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244523,9 +244524,9 @@ def index_rockwell_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rockwell\" + """Return vulnerability data stored in index \"roche\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` :param page: set the page number of the response :type page: int @@ -244597,7 +244598,7 @@ def index_rockwell_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rockwell_get_serialize( + _param = self._index_roche_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244629,7 +244630,7 @@ def index_rockwell_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", '404': "str", '500': "str", } @@ -244640,7 +244641,7 @@ def index_rockwell_get_without_preload_content( return response_data.response - def _index_rockwell_get_serialize( + def _index_roche_get_serialize( self, page, limit, @@ -244808,7 +244809,7 @@ def _index_rockwell_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rockwell', + resource_path='/v3/index/roche', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -244825,7 +244826,7 @@ def _index_rockwell_get_serialize( @validate_call - def index_rocky_errata_get( + def index_rockwell_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244863,10 +244864,10 @@ def index_rocky_errata_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination: - """Return vulnerability data stored in index \"rocky-errata\" + ) -> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination: + """Return vulnerability data stored in index \"rockwell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` :param page: set the page number of the response :type page: int @@ -244938,7 +244939,7 @@ def index_rocky_errata_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_errata_get_serialize( + _param = self._index_rockwell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244970,7 +244971,7 @@ def index_rocky_errata_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", '404': "str", '500': "str", } @@ -244986,7 +244987,7 @@ def index_rocky_errata_get( @validate_call - def index_rocky_errata_get_with_http_info( + def index_rockwell_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245024,10 +245025,10 @@ def index_rocky_errata_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination]: - """Return vulnerability data stored in index \"rocky-errata\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination]: + """Return vulnerability data stored in index \"rockwell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` :param page: set the page number of the response :type page: int @@ -245099,7 +245100,7 @@ def index_rocky_errata_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_errata_get_serialize( + _param = self._index_rockwell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245131,7 +245132,7 @@ def index_rocky_errata_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", '404': "str", '500': "str", } @@ -245147,7 +245148,7 @@ def index_rocky_errata_get_with_http_info( @validate_call - def index_rocky_errata_get_without_preload_content( + def index_rockwell_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245186,9 +245187,9 @@ def index_rocky_errata_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rocky-errata\" + """Return vulnerability data stored in index \"rockwell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` :param page: set the page number of the response :type page: int @@ -245260,7 +245261,7 @@ def index_rocky_errata_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_errata_get_serialize( + _param = self._index_rockwell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245292,7 +245293,7 @@ def index_rocky_errata_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", '404': "str", '500': "str", } @@ -245303,7 +245304,7 @@ def index_rocky_errata_get_without_preload_content( return response_data.response - def _index_rocky_errata_get_serialize( + def _index_rockwell_get_serialize( self, page, limit, @@ -245471,7 +245472,7 @@ def _index_rocky_errata_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rocky-errata', + resource_path='/v3/index/rockwell', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -245488,7 +245489,7 @@ def _index_rocky_errata_get_serialize( @validate_call - def index_rocky_get( + def index_rocky_errata_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245526,10 +245527,10 @@ def index_rocky_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiUpdatePaginatePagination: - """Return vulnerability data stored in index \"rocky\" + ) -> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination: + """Return vulnerability data stored in index \"rocky-errata\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` :param page: set the page number of the response :type page: int @@ -245601,7 +245602,7 @@ def index_rocky_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_get_serialize( + _param = self._index_rocky_errata_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245633,7 +245634,7 @@ def index_rocky_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", '404': "str", '500': "str", } @@ -245649,7 +245650,7 @@ def index_rocky_get( @validate_call - def index_rocky_get_with_http_info( + def index_rocky_errata_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245687,10 +245688,10 @@ def index_rocky_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiUpdatePaginatePagination]: - """Return vulnerability data stored in index \"rocky\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination]: + """Return vulnerability data stored in index \"rocky-errata\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` :param page: set the page number of the response :type page: int @@ -245762,7 +245763,7 @@ def index_rocky_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_get_serialize( + _param = self._index_rocky_errata_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245794,7 +245795,7 @@ def index_rocky_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", '404': "str", '500': "str", } @@ -245810,7 +245811,7 @@ def index_rocky_get_with_http_info( @validate_call - def index_rocky_get_without_preload_content( + def index_rocky_errata_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245849,9 +245850,9 @@ def index_rocky_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rocky\" + """Return vulnerability data stored in index \"rocky-errata\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` :param page: set the page number of the response :type page: int @@ -245923,7 +245924,7 @@ def index_rocky_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_get_serialize( + _param = self._index_rocky_errata_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245955,7 +245956,7 @@ def index_rocky_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", '404': "str", '500': "str", } @@ -245966,7 +245967,7 @@ def index_rocky_get_without_preload_content( return response_data.response - def _index_rocky_get_serialize( + def _index_rocky_errata_get_serialize( self, page, limit, @@ -246134,7 +246135,7 @@ def _index_rocky_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rocky', + resource_path='/v3/index/rocky-errata', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -246151,7 +246152,7 @@ def _index_rocky_get_serialize( @validate_call - def index_rocky_purls_get( + def index_rocky_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246189,10 +246190,10 @@ def index_rocky_purls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: - """Return vulnerability data stored in index \"rocky-purls\" + ) -> RenderResponseWithMetadataArrayApiUpdatePaginatePagination: + """Return vulnerability data stored in index \"rocky\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` :param page: set the page number of the response :type page: int @@ -246264,7 +246265,7 @@ def index_rocky_purls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_purls_get_serialize( + _param = self._index_rocky_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246296,7 +246297,7 @@ def index_rocky_purls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", '404': "str", '500': "str", } @@ -246312,7 +246313,7 @@ def index_rocky_purls_get( @validate_call - def index_rocky_purls_get_with_http_info( + def index_rocky_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246350,10 +246351,10 @@ def index_rocky_purls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: - """Return vulnerability data stored in index \"rocky-purls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiUpdatePaginatePagination]: + """Return vulnerability data stored in index \"rocky\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` :param page: set the page number of the response :type page: int @@ -246425,7 +246426,7 @@ def index_rocky_purls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_purls_get_serialize( + _param = self._index_rocky_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246457,7 +246458,7 @@ def index_rocky_purls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", '404': "str", '500': "str", } @@ -246473,7 +246474,7 @@ def index_rocky_purls_get_with_http_info( @validate_call - def index_rocky_purls_get_without_preload_content( + def index_rocky_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246512,9 +246513,9 @@ def index_rocky_purls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rocky-purls\" + """Return vulnerability data stored in index \"rocky\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` :param page: set the page number of the response :type page: int @@ -246586,7 +246587,7 @@ def index_rocky_purls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_purls_get_serialize( + _param = self._index_rocky_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246618,7 +246619,7 @@ def index_rocky_purls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", '404': "str", '500': "str", } @@ -246629,7 +246630,7 @@ def index_rocky_purls_get_without_preload_content( return response_data.response - def _index_rocky_purls_get_serialize( + def _index_rocky_get_serialize( self, page, limit, @@ -246797,7 +246798,7 @@ def _index_rocky_purls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rocky-purls', + resource_path='/v3/index/rocky', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -246814,7 +246815,7 @@ def _index_rocky_purls_get_serialize( @validate_call - def index_rsync_get( + def index_rocky_purls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246852,10 +246853,10 @@ def index_rsync_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination: - """Return vulnerability data stored in index \"rsync\" + ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: + """Return vulnerability data stored in index \"rocky-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` :param page: set the page number of the response :type page: int @@ -246927,7 +246928,7 @@ def index_rsync_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rsync_get_serialize( + _param = self._index_rocky_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246959,7 +246960,7 @@ def index_rsync_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -246975,7 +246976,7 @@ def index_rsync_get( @validate_call - def index_rsync_get_with_http_info( + def index_rocky_purls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247013,10 +247014,10 @@ def index_rsync_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination]: - """Return vulnerability data stored in index \"rsync\" + ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: + """Return vulnerability data stored in index \"rocky-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` :param page: set the page number of the response :type page: int @@ -247088,7 +247089,7 @@ def index_rsync_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rsync_get_serialize( + _param = self._index_rocky_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247120,7 +247121,7 @@ def index_rsync_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -247136,7 +247137,7 @@ def index_rsync_get_with_http_info( @validate_call - def index_rsync_get_without_preload_content( + def index_rocky_purls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247175,9 +247176,9 @@ def index_rsync_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rsync\" + """Return vulnerability data stored in index \"rocky-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` :param page: set the page number of the response :type page: int @@ -247249,7 +247250,7 @@ def index_rsync_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rsync_get_serialize( + _param = self._index_rocky_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247281,7 +247282,7 @@ def index_rsync_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -247292,7 +247293,7 @@ def index_rsync_get_without_preload_content( return response_data.response - def _index_rsync_get_serialize( + def _index_rocky_purls_get_serialize( self, page, limit, @@ -247460,7 +247461,7 @@ def _index_rsync_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rsync', + resource_path='/v3/index/rocky-purls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -247477,7 +247478,7 @@ def _index_rsync_get_serialize( @validate_call - def index_ruckus_get( + def index_rsync_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247515,10 +247516,10 @@ def index_ruckus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination: - """Return vulnerability data stored in index \"ruckus\" + ) -> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination: + """Return vulnerability data stored in index \"rsync\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` :param page: set the page number of the response :type page: int @@ -247590,7 +247591,7 @@ def index_ruckus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ruckus_get_serialize( + _param = self._index_rsync_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247622,7 +247623,7 @@ def index_ruckus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", '404': "str", '500': "str", } @@ -247638,7 +247639,7 @@ def index_ruckus_get( @validate_call - def index_ruckus_get_with_http_info( + def index_rsync_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247676,10 +247677,10 @@ def index_ruckus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination]: - """Return vulnerability data stored in index \"ruckus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination]: + """Return vulnerability data stored in index \"rsync\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` :param page: set the page number of the response :type page: int @@ -247751,7 +247752,7 @@ def index_ruckus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ruckus_get_serialize( + _param = self._index_rsync_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247783,7 +247784,7 @@ def index_ruckus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", '404': "str", '500': "str", } @@ -247799,7 +247800,7 @@ def index_ruckus_get_with_http_info( @validate_call - def index_ruckus_get_without_preload_content( + def index_rsync_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247838,9 +247839,9 @@ def index_ruckus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ruckus\" + """Return vulnerability data stored in index \"rsync\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` :param page: set the page number of the response :type page: int @@ -247912,7 +247913,7 @@ def index_ruckus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ruckus_get_serialize( + _param = self._index_rsync_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247944,7 +247945,7 @@ def index_ruckus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", '404': "str", '500': "str", } @@ -247955,7 +247956,7 @@ def index_ruckus_get_without_preload_content( return response_data.response - def _index_ruckus_get_serialize( + def _index_rsync_get_serialize( self, page, limit, @@ -248123,7 +248124,7 @@ def _index_ruckus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ruckus', + resource_path='/v3/index/rsync', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -248140,7 +248141,7 @@ def _index_ruckus_get_serialize( @validate_call - def index_rustsec_advisories_get( + def index_ruckus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248178,10 +248179,10 @@ def index_rustsec_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"rustsec-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination: + """Return vulnerability data stored in index \"ruckus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` :param page: set the page number of the response :type page: int @@ -248253,7 +248254,7 @@ def index_rustsec_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rustsec_advisories_get_serialize( + _param = self._index_ruckus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248285,7 +248286,7 @@ def index_rustsec_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", '404': "str", '500': "str", } @@ -248301,7 +248302,7 @@ def index_rustsec_advisories_get( @validate_call - def index_rustsec_advisories_get_with_http_info( + def index_ruckus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248339,10 +248340,10 @@ def index_rustsec_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"rustsec-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination]: + """Return vulnerability data stored in index \"ruckus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` :param page: set the page number of the response :type page: int @@ -248414,7 +248415,7 @@ def index_rustsec_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rustsec_advisories_get_serialize( + _param = self._index_ruckus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248446,7 +248447,7 @@ def index_rustsec_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", '404': "str", '500': "str", } @@ -248462,7 +248463,7 @@ def index_rustsec_advisories_get_with_http_info( @validate_call - def index_rustsec_advisories_get_without_preload_content( + def index_ruckus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248501,9 +248502,9 @@ def index_rustsec_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rustsec-advisories\" + """Return vulnerability data stored in index \"ruckus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` :param page: set the page number of the response :type page: int @@ -248575,7 +248576,7 @@ def index_rustsec_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rustsec_advisories_get_serialize( + _param = self._index_ruckus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248607,7 +248608,7 @@ def index_rustsec_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", '404': "str", '500': "str", } @@ -248618,7 +248619,7 @@ def index_rustsec_advisories_get_without_preload_content( return response_data.response - def _index_rustsec_advisories_get_serialize( + def _index_ruckus_get_serialize( self, page, limit, @@ -248786,7 +248787,7 @@ def _index_rustsec_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rustsec-advisories', + resource_path='/v3/index/ruckus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -248803,7 +248804,7 @@ def _index_rustsec_advisories_get_serialize( @validate_call - def index_sacert_get( + def index_rustsec_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248841,10 +248842,10 @@ def index_sacert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"sacert\" + ) -> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"rustsec-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -248916,7 +248917,7 @@ def index_sacert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sacert_get_serialize( + _param = self._index_rustsec_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248948,7 +248949,7 @@ def index_sacert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -248964,7 +248965,7 @@ def index_sacert_get( @validate_call - def index_sacert_get_with_http_info( + def index_rustsec_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249002,10 +249003,10 @@ def index_sacert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"sacert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"rustsec-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -249077,7 +249078,7 @@ def index_sacert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sacert_get_serialize( + _param = self._index_rustsec_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249109,7 +249110,7 @@ def index_sacert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -249125,7 +249126,7 @@ def index_sacert_get_with_http_info( @validate_call - def index_sacert_get_without_preload_content( + def index_rustsec_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249164,9 +249165,9 @@ def index_sacert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sacert\" + """Return vulnerability data stored in index \"rustsec-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -249238,7 +249239,7 @@ def index_sacert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sacert_get_serialize( + _param = self._index_rustsec_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249270,7 +249271,7 @@ def index_sacert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -249281,7 +249282,7 @@ def index_sacert_get_without_preload_content( return response_data.response - def _index_sacert_get_serialize( + def _index_rustsec_advisories_get_serialize( self, page, limit, @@ -249449,7 +249450,7 @@ def _index_sacert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sacert', + resource_path='/v3/index/rustsec-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -249466,7 +249467,7 @@ def _index_sacert_get_serialize( @validate_call - def index_safran_get( + def index_sacert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249504,10 +249505,10 @@ def index_safran_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination: - """Return vulnerability data stored in index \"safran\" + ) -> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"sacert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` :param page: set the page number of the response :type page: int @@ -249579,7 +249580,7 @@ def index_safran_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_safran_get_serialize( + _param = self._index_sacert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249611,7 +249612,7 @@ def index_safran_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -249627,7 +249628,7 @@ def index_safran_get( @validate_call - def index_safran_get_with_http_info( + def index_sacert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249665,10 +249666,10 @@ def index_safran_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination]: - """Return vulnerability data stored in index \"safran\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"sacert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` :param page: set the page number of the response :type page: int @@ -249740,7 +249741,7 @@ def index_safran_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_safran_get_serialize( + _param = self._index_sacert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249772,7 +249773,7 @@ def index_safran_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -249788,7 +249789,7 @@ def index_safran_get_with_http_info( @validate_call - def index_safran_get_without_preload_content( + def index_sacert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249827,9 +249828,9 @@ def index_safran_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"safran\" + """Return vulnerability data stored in index \"sacert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` :param page: set the page number of the response :type page: int @@ -249901,7 +249902,7 @@ def index_safran_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_safran_get_serialize( + _param = self._index_sacert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249933,7 +249934,7 @@ def index_safran_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -249944,7 +249945,7 @@ def index_safran_get_without_preload_content( return response_data.response - def _index_safran_get_serialize( + def _index_sacert_get_serialize( self, page, limit, @@ -250112,7 +250113,7 @@ def _index_safran_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/safran', + resource_path='/v3/index/sacert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -250129,7 +250130,7 @@ def _index_safran_get_serialize( @validate_call - def index_saint_get( + def index_safran_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250167,10 +250168,10 @@ def index_saint_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination: - """Return vulnerability data stored in index \"saint\" + ) -> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination: + """Return vulnerability data stored in index \"safran\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` :param page: set the page number of the response :type page: int @@ -250242,7 +250243,7 @@ def index_saint_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_saint_get_serialize( + _param = self._index_safran_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250274,7 +250275,7 @@ def index_saint_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", '404': "str", '500': "str", } @@ -250290,7 +250291,7 @@ def index_saint_get( @validate_call - def index_saint_get_with_http_info( + def index_safran_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250328,10 +250329,10 @@ def index_saint_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination]: - """Return vulnerability data stored in index \"saint\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination]: + """Return vulnerability data stored in index \"safran\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` :param page: set the page number of the response :type page: int @@ -250403,7 +250404,7 @@ def index_saint_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_saint_get_serialize( + _param = self._index_safran_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250435,7 +250436,7 @@ def index_saint_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", '404': "str", '500': "str", } @@ -250451,7 +250452,7 @@ def index_saint_get_with_http_info( @validate_call - def index_saint_get_without_preload_content( + def index_safran_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250490,9 +250491,9 @@ def index_saint_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"saint\" + """Return vulnerability data stored in index \"safran\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` :param page: set the page number of the response :type page: int @@ -250564,7 +250565,7 @@ def index_saint_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_saint_get_serialize( + _param = self._index_safran_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250596,7 +250597,7 @@ def index_saint_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", '404': "str", '500': "str", } @@ -250607,7 +250608,7 @@ def index_saint_get_without_preload_content( return response_data.response - def _index_saint_get_serialize( + def _index_safran_get_serialize( self, page, limit, @@ -250775,7 +250776,7 @@ def _index_saint_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/saint', + resource_path='/v3/index/safran', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -250792,7 +250793,7 @@ def _index_saint_get_serialize( @validate_call - def index_salesforce_get( + def index_saint_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250830,10 +250831,10 @@ def index_salesforce_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination: - """Return vulnerability data stored in index \"salesforce\" + ) -> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination: + """Return vulnerability data stored in index \"saint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` :param page: set the page number of the response :type page: int @@ -250905,7 +250906,7 @@ def index_salesforce_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_salesforce_get_serialize( + _param = self._index_saint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250937,7 +250938,7 @@ def index_salesforce_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", '404': "str", '500': "str", } @@ -250953,7 +250954,7 @@ def index_salesforce_get( @validate_call - def index_salesforce_get_with_http_info( + def index_saint_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250991,10 +250992,10 @@ def index_salesforce_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination]: - """Return vulnerability data stored in index \"salesforce\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination]: + """Return vulnerability data stored in index \"saint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` :param page: set the page number of the response :type page: int @@ -251066,7 +251067,7 @@ def index_salesforce_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_salesforce_get_serialize( + _param = self._index_saint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251098,7 +251099,7 @@ def index_salesforce_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", '404': "str", '500': "str", } @@ -251114,7 +251115,7 @@ def index_salesforce_get_with_http_info( @validate_call - def index_salesforce_get_without_preload_content( + def index_saint_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251153,9 +251154,9 @@ def index_salesforce_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"salesforce\" + """Return vulnerability data stored in index \"saint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` :param page: set the page number of the response :type page: int @@ -251227,7 +251228,7 @@ def index_salesforce_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_salesforce_get_serialize( + _param = self._index_saint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251259,7 +251260,7 @@ def index_salesforce_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", '404': "str", '500': "str", } @@ -251270,7 +251271,7 @@ def index_salesforce_get_without_preload_content( return response_data.response - def _index_salesforce_get_serialize( + def _index_saint_get_serialize( self, page, limit, @@ -251438,7 +251439,7 @@ def _index_salesforce_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/salesforce', + resource_path='/v3/index/saint', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -251455,7 +251456,7 @@ def _index_salesforce_get_serialize( @validate_call - def index_samba_get( + def index_salesforce_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251493,10 +251494,10 @@ def index_samba_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination: - """Return vulnerability data stored in index \"samba\" + ) -> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination: + """Return vulnerability data stored in index \"salesforce\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` :param page: set the page number of the response :type page: int @@ -251568,7 +251569,7 @@ def index_samba_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_samba_get_serialize( + _param = self._index_salesforce_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251600,7 +251601,7 @@ def index_samba_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", '404': "str", '500': "str", } @@ -251616,7 +251617,7 @@ def index_samba_get( @validate_call - def index_samba_get_with_http_info( + def index_salesforce_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251654,10 +251655,10 @@ def index_samba_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination]: - """Return vulnerability data stored in index \"samba\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination]: + """Return vulnerability data stored in index \"salesforce\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` :param page: set the page number of the response :type page: int @@ -251729,7 +251730,7 @@ def index_samba_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_samba_get_serialize( + _param = self._index_salesforce_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251761,7 +251762,7 @@ def index_samba_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", '404': "str", '500': "str", } @@ -251777,7 +251778,7 @@ def index_samba_get_with_http_info( @validate_call - def index_samba_get_without_preload_content( + def index_salesforce_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251816,9 +251817,9 @@ def index_samba_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"samba\" + """Return vulnerability data stored in index \"salesforce\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` :param page: set the page number of the response :type page: int @@ -251890,7 +251891,7 @@ def index_samba_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_samba_get_serialize( + _param = self._index_salesforce_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251922,7 +251923,7 @@ def index_samba_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", '404': "str", '500': "str", } @@ -251933,7 +251934,7 @@ def index_samba_get_without_preload_content( return response_data.response - def _index_samba_get_serialize( + def _index_salesforce_get_serialize( self, page, limit, @@ -252101,7 +252102,7 @@ def _index_samba_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/samba', + resource_path='/v3/index/salesforce', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -252118,7 +252119,7 @@ def _index_samba_get_serialize( @validate_call - def index_sandisk_get( + def index_samba_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252156,10 +252157,10 @@ def index_sandisk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination: - """Return vulnerability data stored in index \"sandisk\" + ) -> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination: + """Return vulnerability data stored in index \"samba\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` :param page: set the page number of the response :type page: int @@ -252231,7 +252232,7 @@ def index_sandisk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sandisk_get_serialize( + _param = self._index_samba_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252263,7 +252264,7 @@ def index_sandisk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", '404': "str", '500': "str", } @@ -252279,7 +252280,7 @@ def index_sandisk_get( @validate_call - def index_sandisk_get_with_http_info( + def index_samba_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252317,10 +252318,10 @@ def index_sandisk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination]: - """Return vulnerability data stored in index \"sandisk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination]: + """Return vulnerability data stored in index \"samba\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` :param page: set the page number of the response :type page: int @@ -252392,7 +252393,7 @@ def index_sandisk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sandisk_get_serialize( + _param = self._index_samba_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252424,7 +252425,7 @@ def index_sandisk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", '404': "str", '500': "str", } @@ -252440,7 +252441,7 @@ def index_sandisk_get_with_http_info( @validate_call - def index_sandisk_get_without_preload_content( + def index_samba_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252479,9 +252480,9 @@ def index_sandisk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sandisk\" + """Return vulnerability data stored in index \"samba\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` :param page: set the page number of the response :type page: int @@ -252553,7 +252554,7 @@ def index_sandisk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sandisk_get_serialize( + _param = self._index_samba_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252585,7 +252586,7 @@ def index_sandisk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", '404': "str", '500': "str", } @@ -252596,7 +252597,7 @@ def index_sandisk_get_without_preload_content( return response_data.response - def _index_sandisk_get_serialize( + def _index_samba_get_serialize( self, page, limit, @@ -252764,7 +252765,7 @@ def _index_sandisk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sandisk', + resource_path='/v3/index/samba', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -252781,7 +252782,7 @@ def _index_sandisk_get_serialize( @validate_call - def index_sans_dshield_get( + def index_sandisk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252819,10 +252820,10 @@ def index_sans_dshield_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination: - """Return vulnerability data stored in index \"sans-dshield\" + ) -> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination: + """Return vulnerability data stored in index \"sandisk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` :param page: set the page number of the response :type page: int @@ -252894,7 +252895,7 @@ def index_sans_dshield_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sans_dshield_get_serialize( + _param = self._index_sandisk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252926,7 +252927,7 @@ def index_sans_dshield_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", '404': "str", '500': "str", } @@ -252942,7 +252943,7 @@ def index_sans_dshield_get( @validate_call - def index_sans_dshield_get_with_http_info( + def index_sandisk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252980,10 +252981,10 @@ def index_sans_dshield_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination]: - """Return vulnerability data stored in index \"sans-dshield\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination]: + """Return vulnerability data stored in index \"sandisk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` :param page: set the page number of the response :type page: int @@ -253055,7 +253056,7 @@ def index_sans_dshield_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sans_dshield_get_serialize( + _param = self._index_sandisk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253087,7 +253088,7 @@ def index_sans_dshield_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", '404': "str", '500': "str", } @@ -253103,7 +253104,7 @@ def index_sans_dshield_get_with_http_info( @validate_call - def index_sans_dshield_get_without_preload_content( + def index_sandisk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253142,9 +253143,9 @@ def index_sans_dshield_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sans-dshield\" + """Return vulnerability data stored in index \"sandisk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` :param page: set the page number of the response :type page: int @@ -253216,7 +253217,7 @@ def index_sans_dshield_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sans_dshield_get_serialize( + _param = self._index_sandisk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253248,7 +253249,7 @@ def index_sans_dshield_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", '404': "str", '500': "str", } @@ -253259,7 +253260,7 @@ def index_sans_dshield_get_without_preload_content( return response_data.response - def _index_sans_dshield_get_serialize( + def _index_sandisk_get_serialize( self, page, limit, @@ -253427,7 +253428,7 @@ def _index_sans_dshield_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sans-dshield', + resource_path='/v3/index/sandisk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -253444,7 +253445,7 @@ def _index_sans_dshield_get_serialize( @validate_call - def index_sap_get( + def index_sans_dshield_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253482,10 +253483,10 @@ def index_sap_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination: - """Return vulnerability data stored in index \"sap\" + ) -> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination: + """Return vulnerability data stored in index \"sans-dshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` :param page: set the page number of the response :type page: int @@ -253557,7 +253558,7 @@ def index_sap_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sap_get_serialize( + _param = self._index_sans_dshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253589,7 +253590,7 @@ def index_sap_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", '404': "str", '500': "str", } @@ -253605,7 +253606,7 @@ def index_sap_get( @validate_call - def index_sap_get_with_http_info( + def index_sans_dshield_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253643,10 +253644,10 @@ def index_sap_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination]: - """Return vulnerability data stored in index \"sap\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination]: + """Return vulnerability data stored in index \"sans-dshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` :param page: set the page number of the response :type page: int @@ -253718,7 +253719,7 @@ def index_sap_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sap_get_serialize( + _param = self._index_sans_dshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253750,7 +253751,7 @@ def index_sap_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", '404': "str", '500': "str", } @@ -253766,7 +253767,7 @@ def index_sap_get_with_http_info( @validate_call - def index_sap_get_without_preload_content( + def index_sans_dshield_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253805,9 +253806,9 @@ def index_sap_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sap\" + """Return vulnerability data stored in index \"sans-dshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` :param page: set the page number of the response :type page: int @@ -253879,7 +253880,7 @@ def index_sap_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sap_get_serialize( + _param = self._index_sans_dshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253911,7 +253912,7 @@ def index_sap_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", '404': "str", '500': "str", } @@ -253922,7 +253923,7 @@ def index_sap_get_without_preload_content( return response_data.response - def _index_sap_get_serialize( + def _index_sans_dshield_get_serialize( self, page, limit, @@ -254090,7 +254091,7 @@ def _index_sap_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sap', + resource_path='/v3/index/sans-dshield', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -254107,7 +254108,7 @@ def _index_sap_get_serialize( @validate_call - def index_schneider_electric_get( + def index_sap_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254145,10 +254146,10 @@ def index_schneider_electric_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"schneider-electric\" + ) -> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination: + """Return vulnerability data stored in index \"sap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` :param page: set the page number of the response :type page: int @@ -254220,7 +254221,7 @@ def index_schneider_electric_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schneider_electric_get_serialize( + _param = self._index_sap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254252,7 +254253,7 @@ def index_schneider_electric_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", '404': "str", '500': "str", } @@ -254268,7 +254269,7 @@ def index_schneider_electric_get( @validate_call - def index_schneider_electric_get_with_http_info( + def index_sap_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254306,10 +254307,10 @@ def index_schneider_electric_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"schneider-electric\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination]: + """Return vulnerability data stored in index \"sap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` :param page: set the page number of the response :type page: int @@ -254381,7 +254382,7 @@ def index_schneider_electric_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schneider_electric_get_serialize( + _param = self._index_sap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254413,7 +254414,7 @@ def index_schneider_electric_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", '404': "str", '500': "str", } @@ -254429,7 +254430,7 @@ def index_schneider_electric_get_with_http_info( @validate_call - def index_schneider_electric_get_without_preload_content( + def index_sap_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254468,9 +254469,9 @@ def index_schneider_electric_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"schneider-electric\" + """Return vulnerability data stored in index \"sap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` :param page: set the page number of the response :type page: int @@ -254542,7 +254543,7 @@ def index_schneider_electric_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schneider_electric_get_serialize( + _param = self._index_sap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254574,7 +254575,7 @@ def index_schneider_electric_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", '404': "str", '500': "str", } @@ -254585,7 +254586,7 @@ def index_schneider_electric_get_without_preload_content( return response_data.response - def _index_schneider_electric_get_serialize( + def _index_sap_get_serialize( self, page, limit, @@ -254753,7 +254754,7 @@ def _index_schneider_electric_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/schneider-electric', + resource_path='/v3/index/sap', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -254770,7 +254771,7 @@ def _index_schneider_electric_get_serialize( @validate_call - def index_schutzwerk_get( + def index_schneider_electric_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254808,10 +254809,10 @@ def index_schutzwerk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination: - """Return vulnerability data stored in index \"schutzwerk\" + ) -> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"schneider-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` :param page: set the page number of the response :type page: int @@ -254883,7 +254884,7 @@ def index_schutzwerk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schutzwerk_get_serialize( + _param = self._index_schneider_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254915,7 +254916,7 @@ def index_schutzwerk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -254931,7 +254932,7 @@ def index_schutzwerk_get( @validate_call - def index_schutzwerk_get_with_http_info( + def index_schneider_electric_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254969,10 +254970,10 @@ def index_schutzwerk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination]: - """Return vulnerability data stored in index \"schutzwerk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"schneider-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` :param page: set the page number of the response :type page: int @@ -255044,7 +255045,7 @@ def index_schutzwerk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schutzwerk_get_serialize( + _param = self._index_schneider_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255076,7 +255077,7 @@ def index_schutzwerk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -255092,7 +255093,7 @@ def index_schutzwerk_get_with_http_info( @validate_call - def index_schutzwerk_get_without_preload_content( + def index_schneider_electric_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255131,9 +255132,9 @@ def index_schutzwerk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"schutzwerk\" + """Return vulnerability data stored in index \"schneider-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` :param page: set the page number of the response :type page: int @@ -255205,7 +255206,7 @@ def index_schutzwerk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schutzwerk_get_serialize( + _param = self._index_schneider_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255237,7 +255238,7 @@ def index_schutzwerk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -255248,7 +255249,7 @@ def index_schutzwerk_get_without_preload_content( return response_data.response - def _index_schutzwerk_get_serialize( + def _index_schneider_electric_get_serialize( self, page, limit, @@ -255416,7 +255417,7 @@ def _index_schutzwerk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/schutzwerk', + resource_path='/v3/index/schneider-electric', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -255433,7 +255434,7 @@ def _index_schutzwerk_get_serialize( @validate_call - def index_sec_consult_get( + def index_schutzwerk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255471,10 +255472,10 @@ def index_sec_consult_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination: - """Return vulnerability data stored in index \"sec-consult\" + ) -> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination: + """Return vulnerability data stored in index \"schutzwerk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` :param page: set the page number of the response :type page: int @@ -255546,7 +255547,7 @@ def index_sec_consult_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sec_consult_get_serialize( + _param = self._index_schutzwerk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255578,7 +255579,7 @@ def index_sec_consult_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", '404': "str", '500': "str", } @@ -255594,7 +255595,7 @@ def index_sec_consult_get( @validate_call - def index_sec_consult_get_with_http_info( + def index_schutzwerk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255632,10 +255633,10 @@ def index_sec_consult_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination]: - """Return vulnerability data stored in index \"sec-consult\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination]: + """Return vulnerability data stored in index \"schutzwerk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` :param page: set the page number of the response :type page: int @@ -255707,7 +255708,7 @@ def index_sec_consult_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sec_consult_get_serialize( + _param = self._index_schutzwerk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255739,7 +255740,7 @@ def index_sec_consult_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", '404': "str", '500': "str", } @@ -255755,7 +255756,7 @@ def index_sec_consult_get_with_http_info( @validate_call - def index_sec_consult_get_without_preload_content( + def index_schutzwerk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255794,9 +255795,9 @@ def index_sec_consult_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sec-consult\" + """Return vulnerability data stored in index \"schutzwerk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` :param page: set the page number of the response :type page: int @@ -255868,7 +255869,7 @@ def index_sec_consult_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sec_consult_get_serialize( + _param = self._index_schutzwerk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255900,7 +255901,7 @@ def index_sec_consult_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", '404': "str", '500': "str", } @@ -255911,7 +255912,7 @@ def index_sec_consult_get_without_preload_content( return response_data.response - def _index_sec_consult_get_serialize( + def _index_schutzwerk_get_serialize( self, page, limit, @@ -256079,7 +256080,7 @@ def _index_sec_consult_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sec-consult', + resource_path='/v3/index/schutzwerk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -256096,7 +256097,7 @@ def _index_sec_consult_get_serialize( @validate_call - def index_securitylab_get( + def index_sec_consult_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256134,10 +256135,10 @@ def index_securitylab_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination: - """Return vulnerability data stored in index \"securitylab\" + ) -> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination: + """Return vulnerability data stored in index \"sec-consult\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` :param page: set the page number of the response :type page: int @@ -256209,7 +256210,7 @@ def index_securitylab_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_securitylab_get_serialize( + _param = self._index_sec_consult_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256241,7 +256242,7 @@ def index_securitylab_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", '404': "str", '500': "str", } @@ -256257,7 +256258,7 @@ def index_securitylab_get( @validate_call - def index_securitylab_get_with_http_info( + def index_sec_consult_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256295,10 +256296,10 @@ def index_securitylab_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination]: - """Return vulnerability data stored in index \"securitylab\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination]: + """Return vulnerability data stored in index \"sec-consult\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` :param page: set the page number of the response :type page: int @@ -256370,7 +256371,7 @@ def index_securitylab_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_securitylab_get_serialize( + _param = self._index_sec_consult_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256402,7 +256403,7 @@ def index_securitylab_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", '404': "str", '500': "str", } @@ -256418,7 +256419,7 @@ def index_securitylab_get_with_http_info( @validate_call - def index_securitylab_get_without_preload_content( + def index_sec_consult_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256457,9 +256458,9 @@ def index_securitylab_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"securitylab\" + """Return vulnerability data stored in index \"sec-consult\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` :param page: set the page number of the response :type page: int @@ -256531,7 +256532,7 @@ def index_securitylab_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_securitylab_get_serialize( + _param = self._index_sec_consult_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256563,7 +256564,7 @@ def index_securitylab_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", '404': "str", '500': "str", } @@ -256574,7 +256575,7 @@ def index_securitylab_get_without_preload_content( return response_data.response - def _index_securitylab_get_serialize( + def _index_sec_consult_get_serialize( self, page, limit, @@ -256742,7 +256743,7 @@ def _index_securitylab_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/securitylab', + resource_path='/v3/index/sec-consult', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -256759,7 +256760,7 @@ def _index_securitylab_get_serialize( @validate_call - def index_seebug_get( + def index_securitylab_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256797,10 +256798,10 @@ def index_seebug_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination: - """Return vulnerability data stored in index \"seebug\" + ) -> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination: + """Return vulnerability data stored in index \"securitylab\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` :param page: set the page number of the response :type page: int @@ -256872,7 +256873,7 @@ def index_seebug_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_seebug_get_serialize( + _param = self._index_securitylab_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256904,7 +256905,7 @@ def index_seebug_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", '404': "str", '500': "str", } @@ -256920,7 +256921,7 @@ def index_seebug_get( @validate_call - def index_seebug_get_with_http_info( + def index_securitylab_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256958,10 +256959,10 @@ def index_seebug_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination]: - """Return vulnerability data stored in index \"seebug\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination]: + """Return vulnerability data stored in index \"securitylab\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` :param page: set the page number of the response :type page: int @@ -257033,7 +257034,7 @@ def index_seebug_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_seebug_get_serialize( + _param = self._index_securitylab_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257065,7 +257066,7 @@ def index_seebug_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", '404': "str", '500': "str", } @@ -257081,7 +257082,7 @@ def index_seebug_get_with_http_info( @validate_call - def index_seebug_get_without_preload_content( + def index_securitylab_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257120,9 +257121,9 @@ def index_seebug_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"seebug\" + """Return vulnerability data stored in index \"securitylab\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` :param page: set the page number of the response :type page: int @@ -257194,7 +257195,7 @@ def index_seebug_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_seebug_get_serialize( + _param = self._index_securitylab_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257226,7 +257227,7 @@ def index_seebug_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", '404': "str", '500': "str", } @@ -257237,7 +257238,7 @@ def index_seebug_get_without_preload_content( return response_data.response - def _index_seebug_get_serialize( + def _index_securitylab_get_serialize( self, page, limit, @@ -257405,7 +257406,7 @@ def _index_seebug_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/seebug', + resource_path='/v3/index/securitylab', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -257422,7 +257423,7 @@ def _index_seebug_get_serialize( @validate_call - def index_sel_get( + def index_seebug_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257460,10 +257461,10 @@ def index_sel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination: - """Return vulnerability data stored in index \"sel\" + ) -> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination: + """Return vulnerability data stored in index \"seebug\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` :param page: set the page number of the response :type page: int @@ -257535,7 +257536,7 @@ def index_sel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sel_get_serialize( + _param = self._index_seebug_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257567,7 +257568,7 @@ def index_sel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", '404': "str", '500': "str", } @@ -257583,7 +257584,7 @@ def index_sel_get( @validate_call - def index_sel_get_with_http_info( + def index_seebug_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257621,10 +257622,10 @@ def index_sel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySelPaginatePagination]: - """Return vulnerability data stored in index \"sel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination]: + """Return vulnerability data stored in index \"seebug\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` :param page: set the page number of the response :type page: int @@ -257696,7 +257697,7 @@ def index_sel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sel_get_serialize( + _param = self._index_seebug_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257728,7 +257729,7 @@ def index_sel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", '404': "str", '500': "str", } @@ -257744,7 +257745,7 @@ def index_sel_get_with_http_info( @validate_call - def index_sel_get_without_preload_content( + def index_seebug_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257783,9 +257784,9 @@ def index_sel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sel\" + """Return vulnerability data stored in index \"seebug\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` :param page: set the page number of the response :type page: int @@ -257857,7 +257858,7 @@ def index_sel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sel_get_serialize( + _param = self._index_seebug_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257889,7 +257890,7 @@ def index_sel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", '404': "str", '500': "str", } @@ -257900,7 +257901,7 @@ def index_sel_get_without_preload_content( return response_data.response - def _index_sel_get_serialize( + def _index_seebug_get_serialize( self, page, limit, @@ -258068,7 +258069,7 @@ def _index_sel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sel', + resource_path='/v3/index/seebug', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -258085,7 +258086,7 @@ def _index_sel_get_serialize( @validate_call - def index_sentinelone_get( + def index_sel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258123,10 +258124,10 @@ def index_sentinelone_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination: - """Return vulnerability data stored in index \"sentinelone\" + ) -> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination: + """Return vulnerability data stored in index \"sel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` :param page: set the page number of the response :type page: int @@ -258198,7 +258199,7 @@ def index_sentinelone_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sentinelone_get_serialize( + _param = self._index_sel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258230,7 +258231,7 @@ def index_sentinelone_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", '404': "str", '500': "str", } @@ -258246,7 +258247,7 @@ def index_sentinelone_get( @validate_call - def index_sentinelone_get_with_http_info( + def index_sel_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258284,10 +258285,10 @@ def index_sentinelone_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination]: - """Return vulnerability data stored in index \"sentinelone\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySelPaginatePagination]: + """Return vulnerability data stored in index \"sel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` :param page: set the page number of the response :type page: int @@ -258359,7 +258360,7 @@ def index_sentinelone_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sentinelone_get_serialize( + _param = self._index_sel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258391,7 +258392,7 @@ def index_sentinelone_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", '404': "str", '500': "str", } @@ -258407,7 +258408,7 @@ def index_sentinelone_get_with_http_info( @validate_call - def index_sentinelone_get_without_preload_content( + def index_sel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258446,9 +258447,9 @@ def index_sentinelone_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sentinelone\" + """Return vulnerability data stored in index \"sel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` :param page: set the page number of the response :type page: int @@ -258520,7 +258521,7 @@ def index_sentinelone_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sentinelone_get_serialize( + _param = self._index_sel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258552,7 +258553,7 @@ def index_sentinelone_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", '404': "str", '500': "str", } @@ -258563,7 +258564,7 @@ def index_sentinelone_get_without_preload_content( return response_data.response - def _index_sentinelone_get_serialize( + def _index_sel_get_serialize( self, page, limit, @@ -258731,7 +258732,7 @@ def _index_sentinelone_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sentinelone', + resource_path='/v3/index/sel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -258748,7 +258749,7 @@ def _index_sentinelone_get_serialize( @validate_call - def index_servicenow_get( + def index_sentinelone_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258786,10 +258787,10 @@ def index_servicenow_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination: - """Return vulnerability data stored in index \"servicenow\" + ) -> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination: + """Return vulnerability data stored in index \"sentinelone\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` :param page: set the page number of the response :type page: int @@ -258861,7 +258862,7 @@ def index_servicenow_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_servicenow_get_serialize( + _param = self._index_sentinelone_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258893,7 +258894,7 @@ def index_servicenow_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", '404': "str", '500': "str", } @@ -258909,7 +258910,7 @@ def index_servicenow_get( @validate_call - def index_servicenow_get_with_http_info( + def index_sentinelone_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258947,10 +258948,10 @@ def index_servicenow_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination]: - """Return vulnerability data stored in index \"servicenow\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination]: + """Return vulnerability data stored in index \"sentinelone\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` :param page: set the page number of the response :type page: int @@ -259022,7 +259023,7 @@ def index_servicenow_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_servicenow_get_serialize( + _param = self._index_sentinelone_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259054,7 +259055,7 @@ def index_servicenow_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", '404': "str", '500': "str", } @@ -259070,7 +259071,7 @@ def index_servicenow_get_with_http_info( @validate_call - def index_servicenow_get_without_preload_content( + def index_sentinelone_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259109,9 +259110,9 @@ def index_servicenow_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"servicenow\" + """Return vulnerability data stored in index \"sentinelone\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` :param page: set the page number of the response :type page: int @@ -259183,7 +259184,7 @@ def index_servicenow_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_servicenow_get_serialize( + _param = self._index_sentinelone_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259215,7 +259216,7 @@ def index_servicenow_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", '404': "str", '500': "str", } @@ -259226,7 +259227,7 @@ def index_servicenow_get_without_preload_content( return response_data.response - def _index_servicenow_get_serialize( + def _index_sentinelone_get_serialize( self, page, limit, @@ -259394,7 +259395,7 @@ def _index_servicenow_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/servicenow', + resource_path='/v3/index/sentinelone', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -259411,7 +259412,7 @@ def _index_servicenow_get_serialize( @validate_call - def index_shadowserver_exploited_get( + def index_servicenow_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259449,10 +259450,10 @@ def index_shadowserver_exploited_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination: - """Return vulnerability data stored in index \"shadowserver-exploited\" + ) -> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination: + """Return vulnerability data stored in index \"servicenow\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` :param page: set the page number of the response :type page: int @@ -259524,7 +259525,7 @@ def index_shadowserver_exploited_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shadowserver_exploited_get_serialize( + _param = self._index_servicenow_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259556,7 +259557,7 @@ def index_shadowserver_exploited_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", '404': "str", '500': "str", } @@ -259572,7 +259573,7 @@ def index_shadowserver_exploited_get( @validate_call - def index_shadowserver_exploited_get_with_http_info( + def index_servicenow_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259610,10 +259611,10 @@ def index_shadowserver_exploited_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination]: - """Return vulnerability data stored in index \"shadowserver-exploited\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination]: + """Return vulnerability data stored in index \"servicenow\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` :param page: set the page number of the response :type page: int @@ -259685,7 +259686,7 @@ def index_shadowserver_exploited_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shadowserver_exploited_get_serialize( + _param = self._index_servicenow_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259717,7 +259718,7 @@ def index_shadowserver_exploited_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", '404': "str", '500': "str", } @@ -259733,7 +259734,7 @@ def index_shadowserver_exploited_get_with_http_info( @validate_call - def index_shadowserver_exploited_get_without_preload_content( + def index_servicenow_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259772,9 +259773,9 @@ def index_shadowserver_exploited_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"shadowserver-exploited\" + """Return vulnerability data stored in index \"servicenow\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` :param page: set the page number of the response :type page: int @@ -259846,7 +259847,7 @@ def index_shadowserver_exploited_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shadowserver_exploited_get_serialize( + _param = self._index_servicenow_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259878,7 +259879,7 @@ def index_shadowserver_exploited_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", '404': "str", '500': "str", } @@ -259889,7 +259890,7 @@ def index_shadowserver_exploited_get_without_preload_content( return response_data.response - def _index_shadowserver_exploited_get_serialize( + def _index_servicenow_get_serialize( self, page, limit, @@ -260057,7 +260058,7 @@ def _index_shadowserver_exploited_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/shadowserver-exploited', + resource_path='/v3/index/servicenow', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -260074,7 +260075,7 @@ def _index_shadowserver_exploited_get_serialize( @validate_call - def index_shielder_get( + def index_shadowserver_exploited_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260112,10 +260113,10 @@ def index_shielder_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination: - """Return vulnerability data stored in index \"shielder\" + ) -> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination: + """Return vulnerability data stored in index \"shadowserver-exploited\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` :param page: set the page number of the response :type page: int @@ -260187,7 +260188,7 @@ def index_shielder_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shielder_get_serialize( + _param = self._index_shadowserver_exploited_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260219,7 +260220,7 @@ def index_shielder_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -260235,7 +260236,7 @@ def index_shielder_get( @validate_call - def index_shielder_get_with_http_info( + def index_shadowserver_exploited_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260273,10 +260274,10 @@ def index_shielder_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination]: - """Return vulnerability data stored in index \"shielder\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination]: + """Return vulnerability data stored in index \"shadowserver-exploited\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` :param page: set the page number of the response :type page: int @@ -260348,7 +260349,7 @@ def index_shielder_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shielder_get_serialize( + _param = self._index_shadowserver_exploited_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260380,7 +260381,7 @@ def index_shielder_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -260396,7 +260397,7 @@ def index_shielder_get_with_http_info( @validate_call - def index_shielder_get_without_preload_content( + def index_shadowserver_exploited_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260435,9 +260436,9 @@ def index_shielder_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"shielder\" + """Return vulnerability data stored in index \"shadowserver-exploited\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` :param page: set the page number of the response :type page: int @@ -260509,7 +260510,7 @@ def index_shielder_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shielder_get_serialize( + _param = self._index_shadowserver_exploited_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260541,7 +260542,7 @@ def index_shielder_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -260552,7 +260553,7 @@ def index_shielder_get_without_preload_content( return response_data.response - def _index_shielder_get_serialize( + def _index_shadowserver_exploited_get_serialize( self, page, limit, @@ -260720,7 +260721,7 @@ def _index_shielder_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/shielder', + resource_path='/v3/index/shadowserver-exploited', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -260737,7 +260738,7 @@ def _index_shielder_get_serialize( @validate_call - def index_sick_get( + def index_shielder_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260775,10 +260776,10 @@ def index_sick_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination: - """Return vulnerability data stored in index \"sick\" + ) -> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination: + """Return vulnerability data stored in index \"shielder\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` :param page: set the page number of the response :type page: int @@ -260850,7 +260851,7 @@ def index_sick_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sick_get_serialize( + _param = self._index_shielder_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260882,7 +260883,7 @@ def index_sick_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", '404': "str", '500': "str", } @@ -260898,7 +260899,7 @@ def index_sick_get( @validate_call - def index_sick_get_with_http_info( + def index_shielder_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260936,10 +260937,10 @@ def index_sick_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySickPaginatePagination]: - """Return vulnerability data stored in index \"sick\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination]: + """Return vulnerability data stored in index \"shielder\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` :param page: set the page number of the response :type page: int @@ -261011,7 +261012,7 @@ def index_sick_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sick_get_serialize( + _param = self._index_shielder_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261043,7 +261044,7 @@ def index_sick_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", '404': "str", '500': "str", } @@ -261059,7 +261060,7 @@ def index_sick_get_with_http_info( @validate_call - def index_sick_get_without_preload_content( + def index_shielder_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261098,9 +261099,9 @@ def index_sick_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sick\" + """Return vulnerability data stored in index \"shielder\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` :param page: set the page number of the response :type page: int @@ -261172,7 +261173,7 @@ def index_sick_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sick_get_serialize( + _param = self._index_shielder_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261204,7 +261205,7 @@ def index_sick_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", '404': "str", '500': "str", } @@ -261215,7 +261216,7 @@ def index_sick_get_without_preload_content( return response_data.response - def _index_sick_get_serialize( + def _index_shielder_get_serialize( self, page, limit, @@ -261383,7 +261384,7 @@ def _index_sick_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sick', + resource_path='/v3/index/shielder', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -261400,7 +261401,7 @@ def _index_sick_get_serialize( @validate_call - def index_siemens_get( + def index_sick_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261438,10 +261439,10 @@ def index_siemens_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"siemens\" + ) -> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination: + """Return vulnerability data stored in index \"sick\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` :param page: set the page number of the response :type page: int @@ -261513,7 +261514,7 @@ def index_siemens_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_siemens_get_serialize( + _param = self._index_sick_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261545,7 +261546,7 @@ def index_siemens_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", '404': "str", '500': "str", } @@ -261561,7 +261562,7 @@ def index_siemens_get( @validate_call - def index_siemens_get_with_http_info( + def index_sick_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261599,10 +261600,10 @@ def index_siemens_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"siemens\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySickPaginatePagination]: + """Return vulnerability data stored in index \"sick\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` :param page: set the page number of the response :type page: int @@ -261674,7 +261675,7 @@ def index_siemens_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_siemens_get_serialize( + _param = self._index_sick_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261706,7 +261707,7 @@ def index_siemens_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", '404': "str", '500': "str", } @@ -261722,7 +261723,7 @@ def index_siemens_get_with_http_info( @validate_call - def index_siemens_get_without_preload_content( + def index_sick_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261761,9 +261762,9 @@ def index_siemens_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"siemens\" + """Return vulnerability data stored in index \"sick\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` :param page: set the page number of the response :type page: int @@ -261835,7 +261836,7 @@ def index_siemens_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_siemens_get_serialize( + _param = self._index_sick_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261867,7 +261868,7 @@ def index_siemens_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", '404': "str", '500': "str", } @@ -261878,7 +261879,7 @@ def index_siemens_get_without_preload_content( return response_data.response - def _index_siemens_get_serialize( + def _index_sick_get_serialize( self, page, limit, @@ -262046,7 +262047,7 @@ def _index_siemens_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/siemens', + resource_path='/v3/index/sick', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -262063,7 +262064,7 @@ def _index_siemens_get_serialize( @validate_call - def index_sierra_wireless_get( + def index_siemens_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262101,10 +262102,10 @@ def index_sierra_wireless_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination: - """Return vulnerability data stored in index \"sierra-wireless\" + ) -> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"siemens\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` :param page: set the page number of the response :type page: int @@ -262176,7 +262177,7 @@ def index_sierra_wireless_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sierra_wireless_get_serialize( + _param = self._index_siemens_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262208,7 +262209,7 @@ def index_sierra_wireless_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -262224,7 +262225,7 @@ def index_sierra_wireless_get( @validate_call - def index_sierra_wireless_get_with_http_info( + def index_siemens_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262262,10 +262263,10 @@ def index_sierra_wireless_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination]: - """Return vulnerability data stored in index \"sierra-wireless\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"siemens\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` :param page: set the page number of the response :type page: int @@ -262337,7 +262338,7 @@ def index_sierra_wireless_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sierra_wireless_get_serialize( + _param = self._index_siemens_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262369,7 +262370,7 @@ def index_sierra_wireless_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -262385,7 +262386,7 @@ def index_sierra_wireless_get_with_http_info( @validate_call - def index_sierra_wireless_get_without_preload_content( + def index_siemens_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262424,9 +262425,9 @@ def index_sierra_wireless_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sierra-wireless\" + """Return vulnerability data stored in index \"siemens\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` :param page: set the page number of the response :type page: int @@ -262498,7 +262499,7 @@ def index_sierra_wireless_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sierra_wireless_get_serialize( + _param = self._index_siemens_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262530,7 +262531,7 @@ def index_sierra_wireless_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -262541,7 +262542,7 @@ def index_sierra_wireless_get_without_preload_content( return response_data.response - def _index_sierra_wireless_get_serialize( + def _index_siemens_get_serialize( self, page, limit, @@ -262709,7 +262710,7 @@ def _index_sierra_wireless_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sierra-wireless', + resource_path='/v3/index/siemens', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -262726,7 +262727,7 @@ def _index_sierra_wireless_get_serialize( @validate_call - def index_sigmahq_sigma_rules_get( + def index_sierra_wireless_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262764,10 +262765,10 @@ def index_sigmahq_sigma_rules_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination: - """Return vulnerability data stored in index \"sigmahq-sigma-rules\" + ) -> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination: + """Return vulnerability data stored in index \"sierra-wireless\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` :param page: set the page number of the response :type page: int @@ -262839,7 +262840,7 @@ def index_sigmahq_sigma_rules_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sigmahq_sigma_rules_get_serialize( + _param = self._index_sierra_wireless_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262871,7 +262872,7 @@ def index_sigmahq_sigma_rules_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", '404': "str", '500': "str", } @@ -262887,7 +262888,7 @@ def index_sigmahq_sigma_rules_get( @validate_call - def index_sigmahq_sigma_rules_get_with_http_info( + def index_sierra_wireless_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262925,10 +262926,10 @@ def index_sigmahq_sigma_rules_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination]: - """Return vulnerability data stored in index \"sigmahq-sigma-rules\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination]: + """Return vulnerability data stored in index \"sierra-wireless\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` :param page: set the page number of the response :type page: int @@ -263000,7 +263001,7 @@ def index_sigmahq_sigma_rules_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sigmahq_sigma_rules_get_serialize( + _param = self._index_sierra_wireless_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263032,7 +263033,7 @@ def index_sigmahq_sigma_rules_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", '404': "str", '500': "str", } @@ -263048,7 +263049,7 @@ def index_sigmahq_sigma_rules_get_with_http_info( @validate_call - def index_sigmahq_sigma_rules_get_without_preload_content( + def index_sierra_wireless_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263087,9 +263088,9 @@ def index_sigmahq_sigma_rules_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sigmahq-sigma-rules\" + """Return vulnerability data stored in index \"sierra-wireless\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` :param page: set the page number of the response :type page: int @@ -263161,7 +263162,7 @@ def index_sigmahq_sigma_rules_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sigmahq_sigma_rules_get_serialize( + _param = self._index_sierra_wireless_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263193,7 +263194,7 @@ def index_sigmahq_sigma_rules_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", '404': "str", '500': "str", } @@ -263204,7 +263205,7 @@ def index_sigmahq_sigma_rules_get_without_preload_content( return response_data.response - def _index_sigmahq_sigma_rules_get_serialize( + def _index_sierra_wireless_get_serialize( self, page, limit, @@ -263372,7 +263373,7 @@ def _index_sigmahq_sigma_rules_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sigmahq-sigma-rules', + resource_path='/v3/index/sierra-wireless', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -263389,7 +263390,7 @@ def _index_sigmahq_sigma_rules_get_serialize( @validate_call - def index_singcert_get( + def index_sigmahq_sigma_rules_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263427,10 +263428,10 @@ def index_singcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination: - """Return vulnerability data stored in index \"singcert\" + ) -> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination: + """Return vulnerability data stored in index \"sigmahq-sigma-rules\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` :param page: set the page number of the response :type page: int @@ -263502,7 +263503,7 @@ def index_singcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_singcert_get_serialize( + _param = self._index_sigmahq_sigma_rules_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263534,7 +263535,7 @@ def index_singcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", '404': "str", '500': "str", } @@ -263550,7 +263551,7 @@ def index_singcert_get( @validate_call - def index_singcert_get_with_http_info( + def index_sigmahq_sigma_rules_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263588,10 +263589,10 @@ def index_singcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination]: - """Return vulnerability data stored in index \"singcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination]: + """Return vulnerability data stored in index \"sigmahq-sigma-rules\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` :param page: set the page number of the response :type page: int @@ -263663,7 +263664,7 @@ def index_singcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_singcert_get_serialize( + _param = self._index_sigmahq_sigma_rules_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263695,7 +263696,7 @@ def index_singcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", '404': "str", '500': "str", } @@ -263711,7 +263712,7 @@ def index_singcert_get_with_http_info( @validate_call - def index_singcert_get_without_preload_content( + def index_sigmahq_sigma_rules_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263750,9 +263751,9 @@ def index_singcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"singcert\" + """Return vulnerability data stored in index \"sigmahq-sigma-rules\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` :param page: set the page number of the response :type page: int @@ -263824,7 +263825,7 @@ def index_singcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_singcert_get_serialize( + _param = self._index_sigmahq_sigma_rules_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263856,7 +263857,7 @@ def index_singcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", '404': "str", '500': "str", } @@ -263867,7 +263868,7 @@ def index_singcert_get_without_preload_content( return response_data.response - def _index_singcert_get_serialize( + def _index_sigmahq_sigma_rules_get_serialize( self, page, limit, @@ -264035,7 +264036,7 @@ def _index_singcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/singcert', + resource_path='/v3/index/sigmahq-sigma-rules', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -264052,7 +264053,7 @@ def _index_singcert_get_serialize( @validate_call - def index_sitecore_get( + def index_singcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264090,10 +264091,10 @@ def index_sitecore_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination: - """Return vulnerability data stored in index \"sitecore\" + ) -> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination: + """Return vulnerability data stored in index \"singcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` :param page: set the page number of the response :type page: int @@ -264165,7 +264166,7 @@ def index_sitecore_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sitecore_get_serialize( + _param = self._index_singcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264197,7 +264198,7 @@ def index_sitecore_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", '404': "str", '500': "str", } @@ -264213,7 +264214,7 @@ def index_sitecore_get( @validate_call - def index_sitecore_get_with_http_info( + def index_singcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264251,10 +264252,10 @@ def index_sitecore_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination]: - """Return vulnerability data stored in index \"sitecore\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination]: + """Return vulnerability data stored in index \"singcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` :param page: set the page number of the response :type page: int @@ -264326,7 +264327,7 @@ def index_sitecore_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sitecore_get_serialize( + _param = self._index_singcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264358,7 +264359,7 @@ def index_sitecore_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", '404': "str", '500': "str", } @@ -264374,7 +264375,7 @@ def index_sitecore_get_with_http_info( @validate_call - def index_sitecore_get_without_preload_content( + def index_singcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264413,9 +264414,9 @@ def index_sitecore_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sitecore\" + """Return vulnerability data stored in index \"singcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` :param page: set the page number of the response :type page: int @@ -264487,7 +264488,7 @@ def index_sitecore_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sitecore_get_serialize( + _param = self._index_singcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264519,7 +264520,7 @@ def index_sitecore_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", '404': "str", '500': "str", } @@ -264530,7 +264531,7 @@ def index_sitecore_get_without_preload_content( return response_data.response - def _index_sitecore_get_serialize( + def _index_singcert_get_serialize( self, page, limit, @@ -264698,7 +264699,7 @@ def _index_sitecore_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sitecore', + resource_path='/v3/index/singcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -264715,7 +264716,7 @@ def _index_sitecore_get_serialize( @validate_call - def index_slackware_get( + def index_sitecore_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264753,10 +264754,10 @@ def index_slackware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination: - """Return vulnerability data stored in index \"slackware\" + ) -> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination: + """Return vulnerability data stored in index \"sitecore\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` :param page: set the page number of the response :type page: int @@ -264828,7 +264829,7 @@ def index_slackware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_slackware_get_serialize( + _param = self._index_sitecore_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264860,7 +264861,7 @@ def index_slackware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", '404': "str", '500': "str", } @@ -264876,7 +264877,7 @@ def index_slackware_get( @validate_call - def index_slackware_get_with_http_info( + def index_sitecore_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264914,10 +264915,10 @@ def index_slackware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination]: - """Return vulnerability data stored in index \"slackware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination]: + """Return vulnerability data stored in index \"sitecore\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` :param page: set the page number of the response :type page: int @@ -264989,7 +264990,7 @@ def index_slackware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_slackware_get_serialize( + _param = self._index_sitecore_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265021,7 +265022,7 @@ def index_slackware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", '404': "str", '500': "str", } @@ -265037,7 +265038,7 @@ def index_slackware_get_with_http_info( @validate_call - def index_slackware_get_without_preload_content( + def index_sitecore_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265076,9 +265077,9 @@ def index_slackware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"slackware\" + """Return vulnerability data stored in index \"sitecore\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` :param page: set the page number of the response :type page: int @@ -265150,7 +265151,7 @@ def index_slackware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_slackware_get_serialize( + _param = self._index_sitecore_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265182,7 +265183,7 @@ def index_slackware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", '404': "str", '500': "str", } @@ -265193,7 +265194,7 @@ def index_slackware_get_without_preload_content( return response_data.response - def _index_slackware_get_serialize( + def _index_sitecore_get_serialize( self, page, limit, @@ -265361,7 +265362,7 @@ def _index_slackware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/slackware', + resource_path='/v3/index/sitecore', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -265378,7 +265379,7 @@ def _index_slackware_get_serialize( @validate_call - def index_solarwinds_get( + def index_slackware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265416,10 +265417,10 @@ def index_solarwinds_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"solarwinds\" + ) -> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination: + """Return vulnerability data stored in index \"slackware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` :param page: set the page number of the response :type page: int @@ -265491,7 +265492,7 @@ def index_solarwinds_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solarwinds_get_serialize( + _param = self._index_slackware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265523,7 +265524,7 @@ def index_solarwinds_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", '404': "str", '500': "str", } @@ -265539,7 +265540,7 @@ def index_solarwinds_get( @validate_call - def index_solarwinds_get_with_http_info( + def index_slackware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265577,10 +265578,10 @@ def index_solarwinds_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"solarwinds\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination]: + """Return vulnerability data stored in index \"slackware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` :param page: set the page number of the response :type page: int @@ -265652,7 +265653,7 @@ def index_solarwinds_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solarwinds_get_serialize( + _param = self._index_slackware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265684,7 +265685,7 @@ def index_solarwinds_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", '404': "str", '500': "str", } @@ -265700,7 +265701,7 @@ def index_solarwinds_get_with_http_info( @validate_call - def index_solarwinds_get_without_preload_content( + def index_slackware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265739,9 +265740,9 @@ def index_solarwinds_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"solarwinds\" + """Return vulnerability data stored in index \"slackware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` :param page: set the page number of the response :type page: int @@ -265813,7 +265814,7 @@ def index_solarwinds_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solarwinds_get_serialize( + _param = self._index_slackware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265845,7 +265846,7 @@ def index_solarwinds_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", '404': "str", '500': "str", } @@ -265856,7 +265857,7 @@ def index_solarwinds_get_without_preload_content( return response_data.response - def _index_solarwinds_get_serialize( + def _index_slackware_get_serialize( self, page, limit, @@ -266024,7 +266025,7 @@ def _index_solarwinds_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/solarwinds', + resource_path='/v3/index/slackware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -266041,7 +266042,7 @@ def _index_solarwinds_get_serialize( @validate_call - def index_solr_get( + def index_solarwinds_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266079,10 +266080,10 @@ def index_solr_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination: - """Return vulnerability data stored in index \"solr\" + ) -> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"solarwinds\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` :param page: set the page number of the response :type page: int @@ -266154,7 +266155,7 @@ def index_solr_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solr_get_serialize( + _param = self._index_solarwinds_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266186,7 +266187,7 @@ def index_solr_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -266202,7 +266203,7 @@ def index_solr_get( @validate_call - def index_solr_get_with_http_info( + def index_solarwinds_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266240,10 +266241,10 @@ def index_solr_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination]: - """Return vulnerability data stored in index \"solr\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"solarwinds\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` :param page: set the page number of the response :type page: int @@ -266315,7 +266316,7 @@ def index_solr_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solr_get_serialize( + _param = self._index_solarwinds_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266347,7 +266348,7 @@ def index_solr_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -266363,7 +266364,7 @@ def index_solr_get_with_http_info( @validate_call - def index_solr_get_without_preload_content( + def index_solarwinds_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266402,9 +266403,9 @@ def index_solr_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"solr\" + """Return vulnerability data stored in index \"solarwinds\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` :param page: set the page number of the response :type page: int @@ -266476,7 +266477,7 @@ def index_solr_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solr_get_serialize( + _param = self._index_solarwinds_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266508,7 +266509,7 @@ def index_solr_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -266519,7 +266520,7 @@ def index_solr_get_without_preload_content( return response_data.response - def _index_solr_get_serialize( + def _index_solarwinds_get_serialize( self, page, limit, @@ -266687,7 +266688,7 @@ def _index_solr_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/solr', + resource_path='/v3/index/solarwinds', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -266704,7 +266705,7 @@ def _index_solr_get_serialize( @validate_call - def index_sonatype_get( + def index_solr_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266742,10 +266743,10 @@ def index_sonatype_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination: - """Return vulnerability data stored in index \"sonatype\" + ) -> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination: + """Return vulnerability data stored in index \"solr\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` :param page: set the page number of the response :type page: int @@ -266817,7 +266818,7 @@ def index_sonatype_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonatype_get_serialize( + _param = self._index_solr_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266849,7 +266850,7 @@ def index_sonatype_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", '404': "str", '500': "str", } @@ -266865,7 +266866,7 @@ def index_sonatype_get( @validate_call - def index_sonatype_get_with_http_info( + def index_solr_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266903,10 +266904,10 @@ def index_sonatype_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination]: - """Return vulnerability data stored in index \"sonatype\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination]: + """Return vulnerability data stored in index \"solr\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` :param page: set the page number of the response :type page: int @@ -266978,7 +266979,7 @@ def index_sonatype_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonatype_get_serialize( + _param = self._index_solr_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267010,7 +267011,7 @@ def index_sonatype_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", '404': "str", '500': "str", } @@ -267026,7 +267027,7 @@ def index_sonatype_get_with_http_info( @validate_call - def index_sonatype_get_without_preload_content( + def index_solr_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267065,9 +267066,9 @@ def index_sonatype_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sonatype\" + """Return vulnerability data stored in index \"solr\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` :param page: set the page number of the response :type page: int @@ -267139,7 +267140,7 @@ def index_sonatype_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonatype_get_serialize( + _param = self._index_solr_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267171,7 +267172,7 @@ def index_sonatype_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", '404': "str", '500': "str", } @@ -267182,7 +267183,7 @@ def index_sonatype_get_without_preload_content( return response_data.response - def _index_sonatype_get_serialize( + def _index_solr_get_serialize( self, page, limit, @@ -267350,7 +267351,7 @@ def _index_sonatype_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sonatype', + resource_path='/v3/index/solr', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -267367,7 +267368,7 @@ def _index_sonatype_get_serialize( @validate_call - def index_sonicwall_get( + def index_sonatype_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267405,10 +267406,10 @@ def index_sonicwall_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"sonicwall\" + ) -> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination: + """Return vulnerability data stored in index \"sonatype\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` :param page: set the page number of the response :type page: int @@ -267480,7 +267481,7 @@ def index_sonicwall_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonicwall_get_serialize( + _param = self._index_sonatype_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267512,7 +267513,7 @@ def index_sonicwall_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", '404': "str", '500': "str", } @@ -267528,7 +267529,7 @@ def index_sonicwall_get( @validate_call - def index_sonicwall_get_with_http_info( + def index_sonatype_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267566,10 +267567,10 @@ def index_sonicwall_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"sonicwall\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination]: + """Return vulnerability data stored in index \"sonatype\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` :param page: set the page number of the response :type page: int @@ -267641,7 +267642,7 @@ def index_sonicwall_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonicwall_get_serialize( + _param = self._index_sonatype_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267673,7 +267674,7 @@ def index_sonicwall_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", '404': "str", '500': "str", } @@ -267689,7 +267690,7 @@ def index_sonicwall_get_with_http_info( @validate_call - def index_sonicwall_get_without_preload_content( + def index_sonatype_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267728,9 +267729,9 @@ def index_sonicwall_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sonicwall\" + """Return vulnerability data stored in index \"sonatype\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` :param page: set the page number of the response :type page: int @@ -267802,7 +267803,7 @@ def index_sonicwall_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonicwall_get_serialize( + _param = self._index_sonatype_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267834,7 +267835,7 @@ def index_sonicwall_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", '404': "str", '500': "str", } @@ -267845,7 +267846,7 @@ def index_sonicwall_get_without_preload_content( return response_data.response - def _index_sonicwall_get_serialize( + def _index_sonatype_get_serialize( self, page, limit, @@ -268013,7 +268014,7 @@ def _index_sonicwall_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sonicwall', + resource_path='/v3/index/sonatype', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -268030,7 +268031,7 @@ def _index_sonicwall_get_serialize( @validate_call - def index_spacelabs_healthcare_get( + def index_sonicwall_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268068,10 +268069,10 @@ def index_spacelabs_healthcare_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"spacelabs-healthcare\" + ) -> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"sonicwall\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` :param page: set the page number of the response :type page: int @@ -268143,7 +268144,7 @@ def index_spacelabs_healthcare_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spacelabs_healthcare_get_serialize( + _param = self._index_sonicwall_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268175,7 +268176,7 @@ def index_spacelabs_healthcare_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -268191,7 +268192,7 @@ def index_spacelabs_healthcare_get( @validate_call - def index_spacelabs_healthcare_get_with_http_info( + def index_sonicwall_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268229,10 +268230,10 @@ def index_spacelabs_healthcare_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"spacelabs-healthcare\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"sonicwall\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` :param page: set the page number of the response :type page: int @@ -268304,7 +268305,7 @@ def index_spacelabs_healthcare_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spacelabs_healthcare_get_serialize( + _param = self._index_sonicwall_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268336,7 +268337,7 @@ def index_spacelabs_healthcare_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -268352,7 +268353,7 @@ def index_spacelabs_healthcare_get_with_http_info( @validate_call - def index_spacelabs_healthcare_get_without_preload_content( + def index_sonicwall_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268391,9 +268392,9 @@ def index_spacelabs_healthcare_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"spacelabs-healthcare\" + """Return vulnerability data stored in index \"sonicwall\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` :param page: set the page number of the response :type page: int @@ -268465,7 +268466,7 @@ def index_spacelabs_healthcare_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spacelabs_healthcare_get_serialize( + _param = self._index_sonicwall_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268497,7 +268498,7 @@ def index_spacelabs_healthcare_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -268508,7 +268509,7 @@ def index_spacelabs_healthcare_get_without_preload_content( return response_data.response - def _index_spacelabs_healthcare_get_serialize( + def _index_sonicwall_get_serialize( self, page, limit, @@ -268676,7 +268677,7 @@ def _index_spacelabs_healthcare_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/spacelabs-healthcare', + resource_path='/v3/index/sonicwall', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -268693,7 +268694,7 @@ def _index_spacelabs_healthcare_get_serialize( @validate_call - def index_splunk_get( + def index_spacelabs_healthcare_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268731,10 +268732,10 @@ def index_splunk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination: - """Return vulnerability data stored in index \"splunk\" + ) -> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"spacelabs-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -268806,7 +268807,7 @@ def index_splunk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_splunk_get_serialize( + _param = self._index_spacelabs_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268838,7 +268839,7 @@ def index_splunk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -268854,7 +268855,7 @@ def index_splunk_get( @validate_call - def index_splunk_get_with_http_info( + def index_spacelabs_healthcare_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268892,10 +268893,10 @@ def index_splunk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination]: - """Return vulnerability data stored in index \"splunk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"spacelabs-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -268967,7 +268968,7 @@ def index_splunk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_splunk_get_serialize( + _param = self._index_spacelabs_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268999,7 +269000,7 @@ def index_splunk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -269015,7 +269016,7 @@ def index_splunk_get_with_http_info( @validate_call - def index_splunk_get_without_preload_content( + def index_spacelabs_healthcare_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269054,9 +269055,9 @@ def index_splunk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"splunk\" + """Return vulnerability data stored in index \"spacelabs-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -269128,7 +269129,7 @@ def index_splunk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_splunk_get_serialize( + _param = self._index_spacelabs_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269160,7 +269161,7 @@ def index_splunk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -269171,7 +269172,7 @@ def index_splunk_get_without_preload_content( return response_data.response - def _index_splunk_get_serialize( + def _index_spacelabs_healthcare_get_serialize( self, page, limit, @@ -269339,7 +269340,7 @@ def _index_splunk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/splunk', + resource_path='/v3/index/spacelabs-healthcare', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -269356,7 +269357,7 @@ def _index_splunk_get_serialize( @validate_call - def index_spring_get( + def index_splunk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269394,10 +269395,10 @@ def index_spring_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination: - """Return vulnerability data stored in index \"spring\" + ) -> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination: + """Return vulnerability data stored in index \"splunk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` :param page: set the page number of the response :type page: int @@ -269469,7 +269470,7 @@ def index_spring_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spring_get_serialize( + _param = self._index_splunk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269501,7 +269502,7 @@ def index_spring_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", '404': "str", '500': "str", } @@ -269517,7 +269518,7 @@ def index_spring_get( @validate_call - def index_spring_get_with_http_info( + def index_splunk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269555,10 +269556,10 @@ def index_spring_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination]: - """Return vulnerability data stored in index \"spring\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination]: + """Return vulnerability data stored in index \"splunk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` :param page: set the page number of the response :type page: int @@ -269630,7 +269631,7 @@ def index_spring_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spring_get_serialize( + _param = self._index_splunk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269662,7 +269663,7 @@ def index_spring_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", '404': "str", '500': "str", } @@ -269678,7 +269679,7 @@ def index_spring_get_with_http_info( @validate_call - def index_spring_get_without_preload_content( + def index_splunk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269717,9 +269718,9 @@ def index_spring_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"spring\" + """Return vulnerability data stored in index \"splunk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` :param page: set the page number of the response :type page: int @@ -269791,7 +269792,7 @@ def index_spring_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spring_get_serialize( + _param = self._index_splunk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269823,7 +269824,7 @@ def index_spring_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", '404': "str", '500': "str", } @@ -269834,7 +269835,7 @@ def index_spring_get_without_preload_content( return response_data.response - def _index_spring_get_serialize( + def _index_splunk_get_serialize( self, page, limit, @@ -270002,7 +270003,7 @@ def _index_spring_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/spring', + resource_path='/v3/index/splunk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -270019,7 +270020,7 @@ def _index_spring_get_serialize( @validate_call - def index_ssd_get( + def index_spring_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270057,10 +270058,10 @@ def index_ssd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"ssd\" + ) -> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination: + """Return vulnerability data stored in index \"spring\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` :param page: set the page number of the response :type page: int @@ -270132,7 +270133,7 @@ def index_ssd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ssd_get_serialize( + _param = self._index_spring_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270164,7 +270165,7 @@ def index_ssd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", '404': "str", '500': "str", } @@ -270180,7 +270181,7 @@ def index_ssd_get( @validate_call - def index_ssd_get_with_http_info( + def index_spring_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270218,10 +270219,10 @@ def index_ssd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"ssd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination]: + """Return vulnerability data stored in index \"spring\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` :param page: set the page number of the response :type page: int @@ -270293,7 +270294,7 @@ def index_ssd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ssd_get_serialize( + _param = self._index_spring_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270325,7 +270326,7 @@ def index_ssd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", '404': "str", '500': "str", } @@ -270341,7 +270342,7 @@ def index_ssd_get_with_http_info( @validate_call - def index_ssd_get_without_preload_content( + def index_spring_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270380,9 +270381,9 @@ def index_ssd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ssd\" + """Return vulnerability data stored in index \"spring\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` :param page: set the page number of the response :type page: int @@ -270454,7 +270455,7 @@ def index_ssd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ssd_get_serialize( + _param = self._index_spring_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270486,7 +270487,7 @@ def index_ssd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", '404': "str", '500': "str", } @@ -270497,7 +270498,7 @@ def index_ssd_get_without_preload_content( return response_data.response - def _index_ssd_get_serialize( + def _index_spring_get_serialize( self, page, limit, @@ -270665,7 +270666,7 @@ def _index_ssd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ssd', + resource_path='/v3/index/spring', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -270682,7 +270683,7 @@ def _index_ssd_get_serialize( @validate_call - def index_stormshield_get( + def index_ssd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270720,10 +270721,10 @@ def index_stormshield_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination: - """Return vulnerability data stored in index \"stormshield\" + ) -> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"ssd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` :param page: set the page number of the response :type page: int @@ -270795,7 +270796,7 @@ def index_stormshield_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stormshield_get_serialize( + _param = self._index_ssd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270827,7 +270828,7 @@ def index_stormshield_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -270843,7 +270844,7 @@ def index_stormshield_get( @validate_call - def index_stormshield_get_with_http_info( + def index_ssd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270881,10 +270882,10 @@ def index_stormshield_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination]: - """Return vulnerability data stored in index \"stormshield\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"ssd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` :param page: set the page number of the response :type page: int @@ -270956,7 +270957,7 @@ def index_stormshield_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stormshield_get_serialize( + _param = self._index_ssd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270988,7 +270989,7 @@ def index_stormshield_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -271004,7 +271005,7 @@ def index_stormshield_get_with_http_info( @validate_call - def index_stormshield_get_without_preload_content( + def index_ssd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271043,9 +271044,9 @@ def index_stormshield_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"stormshield\" + """Return vulnerability data stored in index \"ssd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` :param page: set the page number of the response :type page: int @@ -271117,7 +271118,7 @@ def index_stormshield_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stormshield_get_serialize( + _param = self._index_ssd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271149,7 +271150,7 @@ def index_stormshield_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -271160,7 +271161,7 @@ def index_stormshield_get_without_preload_content( return response_data.response - def _index_stormshield_get_serialize( + def _index_ssd_get_serialize( self, page, limit, @@ -271328,7 +271329,7 @@ def _index_stormshield_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/stormshield', + resource_path='/v3/index/ssd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -271345,7 +271346,7 @@ def _index_stormshield_get_serialize( @validate_call - def index_stryker_get( + def index_stormshield_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271383,10 +271384,10 @@ def index_stryker_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"stryker\" + ) -> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination: + """Return vulnerability data stored in index \"stormshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` :param page: set the page number of the response :type page: int @@ -271458,7 +271459,7 @@ def index_stryker_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stryker_get_serialize( + _param = self._index_stormshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271490,7 +271491,7 @@ def index_stryker_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", '404': "str", '500': "str", } @@ -271506,7 +271507,7 @@ def index_stryker_get( @validate_call - def index_stryker_get_with_http_info( + def index_stormshield_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271544,10 +271545,10 @@ def index_stryker_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"stryker\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination]: + """Return vulnerability data stored in index \"stormshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` :param page: set the page number of the response :type page: int @@ -271619,7 +271620,7 @@ def index_stryker_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stryker_get_serialize( + _param = self._index_stormshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271651,7 +271652,7 @@ def index_stryker_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", '404': "str", '500': "str", } @@ -271667,7 +271668,7 @@ def index_stryker_get_with_http_info( @validate_call - def index_stryker_get_without_preload_content( + def index_stormshield_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271706,9 +271707,9 @@ def index_stryker_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"stryker\" + """Return vulnerability data stored in index \"stormshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` :param page: set the page number of the response :type page: int @@ -271780,7 +271781,7 @@ def index_stryker_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stryker_get_serialize( + _param = self._index_stormshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271812,7 +271813,7 @@ def index_stryker_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", '404': "str", '500': "str", } @@ -271823,7 +271824,7 @@ def index_stryker_get_without_preload_content( return response_data.response - def _index_stryker_get_serialize( + def _index_stormshield_get_serialize( self, page, limit, @@ -271991,7 +271992,7 @@ def _index_stryker_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/stryker', + resource_path='/v3/index/stormshield', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -272008,7 +272009,7 @@ def _index_stryker_get_serialize( @validate_call - def index_sudo_get( + def index_stryker_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272046,10 +272047,10 @@ def index_sudo_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination: - """Return vulnerability data stored in index \"sudo\" + ) -> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"stryker\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` :param page: set the page number of the response :type page: int @@ -272121,7 +272122,7 @@ def index_sudo_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sudo_get_serialize( + _param = self._index_stryker_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272153,7 +272154,7 @@ def index_sudo_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -272169,7 +272170,7 @@ def index_sudo_get( @validate_call - def index_sudo_get_with_http_info( + def index_stryker_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272207,10 +272208,10 @@ def index_sudo_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination]: - """Return vulnerability data stored in index \"sudo\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"stryker\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` :param page: set the page number of the response :type page: int @@ -272282,7 +272283,7 @@ def index_sudo_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sudo_get_serialize( + _param = self._index_stryker_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272314,7 +272315,7 @@ def index_sudo_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -272330,7 +272331,7 @@ def index_sudo_get_with_http_info( @validate_call - def index_sudo_get_without_preload_content( + def index_stryker_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272369,9 +272370,9 @@ def index_sudo_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sudo\" + """Return vulnerability data stored in index \"stryker\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` :param page: set the page number of the response :type page: int @@ -272443,7 +272444,7 @@ def index_sudo_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sudo_get_serialize( + _param = self._index_stryker_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272475,7 +272476,7 @@ def index_sudo_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -272486,7 +272487,7 @@ def index_sudo_get_without_preload_content( return response_data.response - def _index_sudo_get_serialize( + def _index_stryker_get_serialize( self, page, limit, @@ -272654,7 +272655,7 @@ def _index_sudo_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sudo', + resource_path='/v3/index/stryker', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -272671,7 +272672,7 @@ def _index_sudo_get_serialize( @validate_call - def index_suse_get( + def index_sudo_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272709,10 +272710,10 @@ def index_suse_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination: - """Return vulnerability data stored in index \"suse\" + ) -> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination: + """Return vulnerability data stored in index \"sudo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` :param page: set the page number of the response :type page: int @@ -272784,7 +272785,7 @@ def index_suse_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_get_serialize( + _param = self._index_sudo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272816,7 +272817,7 @@ def index_suse_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", '404': "str", '500': "str", } @@ -272832,7 +272833,7 @@ def index_suse_get( @validate_call - def index_suse_get_with_http_info( + def index_sudo_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272870,10 +272871,10 @@ def index_suse_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination]: - """Return vulnerability data stored in index \"suse\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination]: + """Return vulnerability data stored in index \"sudo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` :param page: set the page number of the response :type page: int @@ -272945,7 +272946,7 @@ def index_suse_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_get_serialize( + _param = self._index_sudo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272977,7 +272978,7 @@ def index_suse_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", '404': "str", '500': "str", } @@ -272993,7 +272994,7 @@ def index_suse_get_with_http_info( @validate_call - def index_suse_get_without_preload_content( + def index_sudo_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273032,9 +273033,9 @@ def index_suse_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"suse\" + """Return vulnerability data stored in index \"sudo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` :param page: set the page number of the response :type page: int @@ -273106,7 +273107,7 @@ def index_suse_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_get_serialize( + _param = self._index_sudo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273138,7 +273139,7 @@ def index_suse_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", '404': "str", '500': "str", } @@ -273149,7 +273150,7 @@ def index_suse_get_without_preload_content( return response_data.response - def _index_suse_get_serialize( + def _index_sudo_get_serialize( self, page, limit, @@ -273317,7 +273318,7 @@ def _index_suse_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/suse', + resource_path='/v3/index/sudo', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -273334,7 +273335,7 @@ def _index_suse_get_serialize( @validate_call - def index_suse_security_get( + def index_suse_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273372,10 +273373,10 @@ def index_suse_security_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination: - """Return vulnerability data stored in index \"suse-security\" + ) -> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination: + """Return vulnerability data stored in index \"suse\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` :param page: set the page number of the response :type page: int @@ -273447,7 +273448,7 @@ def index_suse_security_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_security_get_serialize( + _param = self._index_suse_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273479,7 +273480,7 @@ def index_suse_security_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", '404': "str", '500': "str", } @@ -273495,7 +273496,7 @@ def index_suse_security_get( @validate_call - def index_suse_security_get_with_http_info( + def index_suse_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273533,10 +273534,10 @@ def index_suse_security_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination]: - """Return vulnerability data stored in index \"suse-security\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination]: + """Return vulnerability data stored in index \"suse\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` :param page: set the page number of the response :type page: int @@ -273608,7 +273609,7 @@ def index_suse_security_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_security_get_serialize( + _param = self._index_suse_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273640,7 +273641,7 @@ def index_suse_security_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", '404': "str", '500': "str", } @@ -273656,7 +273657,7 @@ def index_suse_security_get_with_http_info( @validate_call - def index_suse_security_get_without_preload_content( + def index_suse_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273695,9 +273696,9 @@ def index_suse_security_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"suse-security\" + """Return vulnerability data stored in index \"suse\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` :param page: set the page number of the response :type page: int @@ -273769,7 +273770,7 @@ def index_suse_security_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_security_get_serialize( + _param = self._index_suse_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273801,7 +273802,7 @@ def index_suse_security_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", '404': "str", '500': "str", } @@ -273812,7 +273813,7 @@ def index_suse_security_get_without_preload_content( return response_data.response - def _index_suse_security_get_serialize( + def _index_suse_get_serialize( self, page, limit, @@ -273980,7 +273981,7 @@ def _index_suse_security_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/suse-security', + resource_path='/v3/index/suse', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -273997,7 +273998,7 @@ def _index_suse_security_get_serialize( @validate_call - def index_swift_get( + def index_suse_security_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274035,10 +274036,10 @@ def index_swift_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"swift\" + ) -> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination: + """Return vulnerability data stored in index \"suse-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` :param page: set the page number of the response :type page: int @@ -274110,7 +274111,7 @@ def index_swift_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swift_get_serialize( + _param = self._index_suse_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274142,7 +274143,7 @@ def index_swift_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", '404': "str", '500': "str", } @@ -274158,7 +274159,7 @@ def index_swift_get( @validate_call - def index_swift_get_with_http_info( + def index_suse_security_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274196,10 +274197,10 @@ def index_swift_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"swift\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination]: + """Return vulnerability data stored in index \"suse-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` :param page: set the page number of the response :type page: int @@ -274271,7 +274272,7 @@ def index_swift_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swift_get_serialize( + _param = self._index_suse_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274303,7 +274304,7 @@ def index_swift_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", '404': "str", '500': "str", } @@ -274319,7 +274320,7 @@ def index_swift_get_with_http_info( @validate_call - def index_swift_get_without_preload_content( + def index_suse_security_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274358,9 +274359,9 @@ def index_swift_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"swift\" + """Return vulnerability data stored in index \"suse-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` :param page: set the page number of the response :type page: int @@ -274432,7 +274433,7 @@ def index_swift_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swift_get_serialize( + _param = self._index_suse_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274464,7 +274465,7 @@ def index_swift_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", '404': "str", '500': "str", } @@ -274475,7 +274476,7 @@ def index_swift_get_without_preload_content( return response_data.response - def _index_swift_get_serialize( + def _index_suse_security_get_serialize( self, page, limit, @@ -274643,7 +274644,7 @@ def _index_swift_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/swift', + resource_path='/v3/index/suse-security', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -274660,7 +274661,7 @@ def _index_swift_get_serialize( @validate_call - def index_swisslog_healthcare_get( + def index_swift_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274698,10 +274699,10 @@ def index_swisslog_healthcare_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"swisslog-healthcare\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"swift\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` :param page: set the page number of the response :type page: int @@ -274773,7 +274774,7 @@ def index_swisslog_healthcare_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swisslog_healthcare_get_serialize( + _param = self._index_swift_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274805,7 +274806,7 @@ def index_swisslog_healthcare_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -274821,7 +274822,7 @@ def index_swisslog_healthcare_get( @validate_call - def index_swisslog_healthcare_get_with_http_info( + def index_swift_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274859,10 +274860,10 @@ def index_swisslog_healthcare_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"swisslog-healthcare\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"swift\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` :param page: set the page number of the response :type page: int @@ -274934,7 +274935,7 @@ def index_swisslog_healthcare_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swisslog_healthcare_get_serialize( + _param = self._index_swift_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274966,7 +274967,7 @@ def index_swisslog_healthcare_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -274982,7 +274983,7 @@ def index_swisslog_healthcare_get_with_http_info( @validate_call - def index_swisslog_healthcare_get_without_preload_content( + def index_swift_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275021,9 +275022,9 @@ def index_swisslog_healthcare_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"swisslog-healthcare\" + """Return vulnerability data stored in index \"swift\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` :param page: set the page number of the response :type page: int @@ -275095,7 +275096,7 @@ def index_swisslog_healthcare_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swisslog_healthcare_get_serialize( + _param = self._index_swift_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275127,7 +275128,7 @@ def index_swisslog_healthcare_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -275138,7 +275139,7 @@ def index_swisslog_healthcare_get_without_preload_content( return response_data.response - def _index_swisslog_healthcare_get_serialize( + def _index_swift_get_serialize( self, page, limit, @@ -275306,7 +275307,7 @@ def _index_swisslog_healthcare_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/swisslog-healthcare', + resource_path='/v3/index/swift', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -275323,7 +275324,7 @@ def _index_swisslog_healthcare_get_serialize( @validate_call - def index_symfony_get( + def index_swisslog_healthcare_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275361,10 +275362,10 @@ def index_symfony_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination: - """Return vulnerability data stored in index \"symfony\" + ) -> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"swisslog-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -275436,7 +275437,7 @@ def index_symfony_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_symfony_get_serialize( + _param = self._index_swisslog_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275468,7 +275469,7 @@ def index_symfony_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -275484,7 +275485,7 @@ def index_symfony_get( @validate_call - def index_symfony_get_with_http_info( + def index_swisslog_healthcare_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275522,10 +275523,10 @@ def index_symfony_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination]: - """Return vulnerability data stored in index \"symfony\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"swisslog-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -275597,7 +275598,7 @@ def index_symfony_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_symfony_get_serialize( + _param = self._index_swisslog_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275629,7 +275630,7 @@ def index_symfony_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -275645,7 +275646,7 @@ def index_symfony_get_with_http_info( @validate_call - def index_symfony_get_without_preload_content( + def index_swisslog_healthcare_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275684,9 +275685,9 @@ def index_symfony_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"symfony\" + """Return vulnerability data stored in index \"swisslog-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -275758,7 +275759,7 @@ def index_symfony_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_symfony_get_serialize( + _param = self._index_swisslog_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275790,7 +275791,7 @@ def index_symfony_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -275801,7 +275802,7 @@ def index_symfony_get_without_preload_content( return response_data.response - def _index_symfony_get_serialize( + def _index_swisslog_healthcare_get_serialize( self, page, limit, @@ -275969,7 +275970,7 @@ def _index_symfony_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/symfony', + resource_path='/v3/index/swisslog-healthcare', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -275986,7 +275987,7 @@ def _index_symfony_get_serialize( @validate_call - def index_synacktiv_get( + def index_symfony_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276024,10 +276025,10 @@ def index_synacktiv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination: - """Return vulnerability data stored in index \"synacktiv\" + ) -> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination: + """Return vulnerability data stored in index \"symfony\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` :param page: set the page number of the response :type page: int @@ -276099,7 +276100,7 @@ def index_synacktiv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synacktiv_get_serialize( + _param = self._index_symfony_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276131,7 +276132,7 @@ def index_synacktiv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", '404': "str", '500': "str", } @@ -276147,7 +276148,7 @@ def index_synacktiv_get( @validate_call - def index_synacktiv_get_with_http_info( + def index_symfony_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276185,10 +276186,10 @@ def index_synacktiv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination]: - """Return vulnerability data stored in index \"synacktiv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination]: + """Return vulnerability data stored in index \"symfony\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` :param page: set the page number of the response :type page: int @@ -276260,7 +276261,7 @@ def index_synacktiv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synacktiv_get_serialize( + _param = self._index_symfony_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276292,7 +276293,7 @@ def index_synacktiv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", '404': "str", '500': "str", } @@ -276308,7 +276309,7 @@ def index_synacktiv_get_with_http_info( @validate_call - def index_synacktiv_get_without_preload_content( + def index_symfony_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276347,9 +276348,9 @@ def index_synacktiv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"synacktiv\" + """Return vulnerability data stored in index \"symfony\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` :param page: set the page number of the response :type page: int @@ -276421,7 +276422,7 @@ def index_synacktiv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synacktiv_get_serialize( + _param = self._index_symfony_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276453,7 +276454,7 @@ def index_synacktiv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", '404': "str", '500': "str", } @@ -276464,7 +276465,7 @@ def index_synacktiv_get_without_preload_content( return response_data.response - def _index_synacktiv_get_serialize( + def _index_symfony_get_serialize( self, page, limit, @@ -276632,7 +276633,7 @@ def _index_synacktiv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/synacktiv', + resource_path='/v3/index/symfony', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -276649,7 +276650,7 @@ def _index_synacktiv_get_serialize( @validate_call - def index_syncrosoft_get( + def index_synacktiv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276687,10 +276688,10 @@ def index_syncrosoft_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination: - """Return vulnerability data stored in index \"syncrosoft\" + ) -> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination: + """Return vulnerability data stored in index \"synacktiv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` :param page: set the page number of the response :type page: int @@ -276762,7 +276763,7 @@ def index_syncrosoft_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syncrosoft_get_serialize( + _param = self._index_synacktiv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276794,7 +276795,7 @@ def index_syncrosoft_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", '404': "str", '500': "str", } @@ -276810,7 +276811,7 @@ def index_syncrosoft_get( @validate_call - def index_syncrosoft_get_with_http_info( + def index_synacktiv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276848,10 +276849,10 @@ def index_syncrosoft_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination]: - """Return vulnerability data stored in index \"syncrosoft\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination]: + """Return vulnerability data stored in index \"synacktiv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` :param page: set the page number of the response :type page: int @@ -276923,7 +276924,7 @@ def index_syncrosoft_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syncrosoft_get_serialize( + _param = self._index_synacktiv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276955,7 +276956,7 @@ def index_syncrosoft_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", '404': "str", '500': "str", } @@ -276971,7 +276972,7 @@ def index_syncrosoft_get_with_http_info( @validate_call - def index_syncrosoft_get_without_preload_content( + def index_synacktiv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277010,9 +277011,9 @@ def index_syncrosoft_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"syncrosoft\" + """Return vulnerability data stored in index \"synacktiv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` :param page: set the page number of the response :type page: int @@ -277084,7 +277085,7 @@ def index_syncrosoft_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syncrosoft_get_serialize( + _param = self._index_synacktiv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277116,7 +277117,7 @@ def index_syncrosoft_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", '404': "str", '500': "str", } @@ -277127,7 +277128,7 @@ def index_syncrosoft_get_without_preload_content( return response_data.response - def _index_syncrosoft_get_serialize( + def _index_synacktiv_get_serialize( self, page, limit, @@ -277295,7 +277296,7 @@ def _index_syncrosoft_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/syncrosoft', + resource_path='/v3/index/synacktiv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -277312,7 +277313,7 @@ def _index_syncrosoft_get_serialize( @validate_call - def index_synology_get( + def index_syncrosoft_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277350,10 +277351,10 @@ def index_synology_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination: - """Return vulnerability data stored in index \"synology\" + ) -> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination: + """Return vulnerability data stored in index \"syncrosoft\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` :param page: set the page number of the response :type page: int @@ -277425,7 +277426,7 @@ def index_synology_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synology_get_serialize( + _param = self._index_syncrosoft_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277457,7 +277458,7 @@ def index_synology_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", '404': "str", '500': "str", } @@ -277473,7 +277474,7 @@ def index_synology_get( @validate_call - def index_synology_get_with_http_info( + def index_syncrosoft_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277511,10 +277512,10 @@ def index_synology_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination]: - """Return vulnerability data stored in index \"synology\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination]: + """Return vulnerability data stored in index \"syncrosoft\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` :param page: set the page number of the response :type page: int @@ -277586,7 +277587,7 @@ def index_synology_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synology_get_serialize( + _param = self._index_syncrosoft_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277618,7 +277619,7 @@ def index_synology_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", '404': "str", '500': "str", } @@ -277634,7 +277635,7 @@ def index_synology_get_with_http_info( @validate_call - def index_synology_get_without_preload_content( + def index_syncrosoft_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277673,9 +277674,9 @@ def index_synology_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"synology\" + """Return vulnerability data stored in index \"syncrosoft\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` :param page: set the page number of the response :type page: int @@ -277747,7 +277748,7 @@ def index_synology_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synology_get_serialize( + _param = self._index_syncrosoft_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277779,7 +277780,7 @@ def index_synology_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", '404': "str", '500': "str", } @@ -277790,7 +277791,7 @@ def index_synology_get_without_preload_content( return response_data.response - def _index_synology_get_serialize( + def _index_syncrosoft_get_serialize( self, page, limit, @@ -277958,7 +277959,7 @@ def _index_synology_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/synology', + resource_path='/v3/index/syncrosoft', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -277975,7 +277976,7 @@ def _index_synology_get_serialize( @validate_call - def index_syss_get( + def index_synology_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278013,10 +278014,10 @@ def index_syss_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination: - """Return vulnerability data stored in index \"syss\" + ) -> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination: + """Return vulnerability data stored in index \"synology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` :param page: set the page number of the response :type page: int @@ -278088,7 +278089,7 @@ def index_syss_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syss_get_serialize( + _param = self._index_synology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278120,7 +278121,7 @@ def index_syss_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", '404': "str", '500': "str", } @@ -278136,7 +278137,7 @@ def index_syss_get( @validate_call - def index_syss_get_with_http_info( + def index_synology_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278174,10 +278175,10 @@ def index_syss_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination]: - """Return vulnerability data stored in index \"syss\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination]: + """Return vulnerability data stored in index \"synology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` :param page: set the page number of the response :type page: int @@ -278249,7 +278250,7 @@ def index_syss_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syss_get_serialize( + _param = self._index_synology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278281,7 +278282,7 @@ def index_syss_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", '404': "str", '500': "str", } @@ -278297,7 +278298,7 @@ def index_syss_get_with_http_info( @validate_call - def index_syss_get_without_preload_content( + def index_synology_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278336,9 +278337,9 @@ def index_syss_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"syss\" + """Return vulnerability data stored in index \"synology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` :param page: set the page number of the response :type page: int @@ -278410,7 +278411,7 @@ def index_syss_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syss_get_serialize( + _param = self._index_synology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278442,7 +278443,7 @@ def index_syss_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", '404': "str", '500': "str", } @@ -278453,7 +278454,7 @@ def index_syss_get_without_preload_content( return response_data.response - def _index_syss_get_serialize( + def _index_synology_get_serialize( self, page, limit, @@ -278621,7 +278622,7 @@ def _index_syss_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/syss', + resource_path='/v3/index/synology', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -278638,7 +278639,7 @@ def _index_syss_get_serialize( @validate_call - def index_tailscale_get( + def index_syss_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278676,10 +278677,10 @@ def index_tailscale_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination: - """Return vulnerability data stored in index \"tailscale\" + ) -> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination: + """Return vulnerability data stored in index \"syss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` :param page: set the page number of the response :type page: int @@ -278751,7 +278752,7 @@ def index_tailscale_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tailscale_get_serialize( + _param = self._index_syss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278783,7 +278784,7 @@ def index_tailscale_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", '404': "str", '500': "str", } @@ -278799,7 +278800,7 @@ def index_tailscale_get( @validate_call - def index_tailscale_get_with_http_info( + def index_syss_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278837,10 +278838,10 @@ def index_tailscale_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination]: - """Return vulnerability data stored in index \"tailscale\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination]: + """Return vulnerability data stored in index \"syss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` :param page: set the page number of the response :type page: int @@ -278912,7 +278913,7 @@ def index_tailscale_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tailscale_get_serialize( + _param = self._index_syss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278944,7 +278945,7 @@ def index_tailscale_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", '404': "str", '500': "str", } @@ -278960,7 +278961,7 @@ def index_tailscale_get_with_http_info( @validate_call - def index_tailscale_get_without_preload_content( + def index_syss_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278999,9 +279000,9 @@ def index_tailscale_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tailscale\" + """Return vulnerability data stored in index \"syss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` :param page: set the page number of the response :type page: int @@ -279073,7 +279074,7 @@ def index_tailscale_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tailscale_get_serialize( + _param = self._index_syss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279105,7 +279106,7 @@ def index_tailscale_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", '404': "str", '500': "str", } @@ -279116,7 +279117,7 @@ def index_tailscale_get_without_preload_content( return response_data.response - def _index_tailscale_get_serialize( + def _index_syss_get_serialize( self, page, limit, @@ -279284,7 +279285,7 @@ def _index_tailscale_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tailscale', + resource_path='/v3/index/syss', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -279301,7 +279302,7 @@ def _index_tailscale_get_serialize( @validate_call - def index_teamviewer_get( + def index_tailscale_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279339,10 +279340,10 @@ def index_teamviewer_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination: - """Return vulnerability data stored in index \"teamviewer\" + ) -> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination: + """Return vulnerability data stored in index \"tailscale\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` :param page: set the page number of the response :type page: int @@ -279414,7 +279415,7 @@ def index_teamviewer_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_teamviewer_get_serialize( + _param = self._index_tailscale_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279446,7 +279447,7 @@ def index_teamviewer_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", '404': "str", '500': "str", } @@ -279462,7 +279463,7 @@ def index_teamviewer_get( @validate_call - def index_teamviewer_get_with_http_info( + def index_tailscale_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279500,10 +279501,10 @@ def index_teamviewer_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination]: - """Return vulnerability data stored in index \"teamviewer\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination]: + """Return vulnerability data stored in index \"tailscale\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` :param page: set the page number of the response :type page: int @@ -279575,7 +279576,7 @@ def index_teamviewer_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_teamviewer_get_serialize( + _param = self._index_tailscale_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279607,7 +279608,7 @@ def index_teamviewer_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", '404': "str", '500': "str", } @@ -279623,7 +279624,7 @@ def index_teamviewer_get_with_http_info( @validate_call - def index_teamviewer_get_without_preload_content( + def index_tailscale_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279662,9 +279663,9 @@ def index_teamviewer_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"teamviewer\" + """Return vulnerability data stored in index \"tailscale\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` :param page: set the page number of the response :type page: int @@ -279736,7 +279737,7 @@ def index_teamviewer_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_teamviewer_get_serialize( + _param = self._index_tailscale_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279768,7 +279769,7 @@ def index_teamviewer_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", '404': "str", '500': "str", } @@ -279779,7 +279780,7 @@ def index_teamviewer_get_without_preload_content( return response_data.response - def _index_teamviewer_get_serialize( + def _index_tailscale_get_serialize( self, page, limit, @@ -279947,7 +279948,7 @@ def _index_teamviewer_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/teamviewer', + resource_path='/v3/index/tailscale', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -279964,7 +279965,7 @@ def _index_teamviewer_get_serialize( @validate_call - def index_tenable_research_advisories_get( + def index_teamviewer_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280002,10 +280003,10 @@ def index_tenable_research_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"tenable-research-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination: + """Return vulnerability data stored in index \"teamviewer\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` :param page: set the page number of the response :type page: int @@ -280077,7 +280078,7 @@ def index_tenable_research_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tenable_research_advisories_get_serialize( + _param = self._index_teamviewer_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280109,7 +280110,7 @@ def index_tenable_research_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", '404': "str", '500': "str", } @@ -280125,7 +280126,7 @@ def index_tenable_research_advisories_get( @validate_call - def index_tenable_research_advisories_get_with_http_info( + def index_teamviewer_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280163,10 +280164,10 @@ def index_tenable_research_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"tenable-research-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination]: + """Return vulnerability data stored in index \"teamviewer\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` :param page: set the page number of the response :type page: int @@ -280238,7 +280239,7 @@ def index_tenable_research_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tenable_research_advisories_get_serialize( + _param = self._index_teamviewer_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280270,7 +280271,7 @@ def index_tenable_research_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", '404': "str", '500': "str", } @@ -280286,7 +280287,7 @@ def index_tenable_research_advisories_get_with_http_info( @validate_call - def index_tenable_research_advisories_get_without_preload_content( + def index_teamviewer_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280325,9 +280326,9 @@ def index_tenable_research_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tenable-research-advisories\" + """Return vulnerability data stored in index \"teamviewer\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` :param page: set the page number of the response :type page: int @@ -280399,7 +280400,7 @@ def index_tenable_research_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tenable_research_advisories_get_serialize( + _param = self._index_teamviewer_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280431,7 +280432,7 @@ def index_tenable_research_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", '404': "str", '500': "str", } @@ -280442,7 +280443,7 @@ def index_tenable_research_advisories_get_without_preload_content( return response_data.response - def _index_tenable_research_advisories_get_serialize( + def _index_teamviewer_get_serialize( self, page, limit, @@ -280610,7 +280611,7 @@ def _index_tenable_research_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tenable-research-advisories', + resource_path='/v3/index/teamviewer', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -280627,7 +280628,7 @@ def _index_tenable_research_advisories_get_serialize( @validate_call - def index_tencent_get( + def index_tenable_research_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280665,10 +280666,10 @@ def index_tencent_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination: - """Return vulnerability data stored in index \"tencent\" + ) -> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"tenable-research-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -280740,7 +280741,7 @@ def index_tencent_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tencent_get_serialize( + _param = self._index_tenable_research_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280772,7 +280773,7 @@ def index_tencent_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -280788,7 +280789,7 @@ def index_tencent_get( @validate_call - def index_tencent_get_with_http_info( + def index_tenable_research_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280826,10 +280827,10 @@ def index_tencent_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination]: - """Return vulnerability data stored in index \"tencent\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"tenable-research-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -280901,7 +280902,7 @@ def index_tencent_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tencent_get_serialize( + _param = self._index_tenable_research_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280933,7 +280934,7 @@ def index_tencent_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -280949,7 +280950,7 @@ def index_tencent_get_with_http_info( @validate_call - def index_tencent_get_without_preload_content( + def index_tenable_research_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280988,9 +280989,9 @@ def index_tencent_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tencent\" + """Return vulnerability data stored in index \"tenable-research-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -281062,7 +281063,7 @@ def index_tencent_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tencent_get_serialize( + _param = self._index_tenable_research_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281094,7 +281095,7 @@ def index_tencent_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -281105,7 +281106,7 @@ def index_tencent_get_without_preload_content( return response_data.response - def _index_tencent_get_serialize( + def _index_tenable_research_advisories_get_serialize( self, page, limit, @@ -281273,7 +281274,7 @@ def _index_tencent_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tencent', + resource_path='/v3/index/tenable-research-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -281290,7 +281291,7 @@ def _index_tencent_get_serialize( @validate_call - def index_thales_get( + def index_tencent_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281328,10 +281329,10 @@ def index_thales_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination: - """Return vulnerability data stored in index \"thales\" + ) -> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination: + """Return vulnerability data stored in index \"tencent\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` :param page: set the page number of the response :type page: int @@ -281403,7 +281404,7 @@ def index_thales_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thales_get_serialize( + _param = self._index_tencent_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281435,7 +281436,7 @@ def index_thales_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", '404': "str", '500': "str", } @@ -281451,7 +281452,7 @@ def index_thales_get( @validate_call - def index_thales_get_with_http_info( + def index_tencent_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281489,10 +281490,10 @@ def index_thales_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination]: - """Return vulnerability data stored in index \"thales\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination]: + """Return vulnerability data stored in index \"tencent\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` :param page: set the page number of the response :type page: int @@ -281564,7 +281565,7 @@ def index_thales_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thales_get_serialize( + _param = self._index_tencent_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281596,7 +281597,7 @@ def index_thales_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", '404': "str", '500': "str", } @@ -281612,7 +281613,7 @@ def index_thales_get_with_http_info( @validate_call - def index_thales_get_without_preload_content( + def index_tencent_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281651,9 +281652,9 @@ def index_thales_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"thales\" + """Return vulnerability data stored in index \"tencent\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` :param page: set the page number of the response :type page: int @@ -281725,7 +281726,7 @@ def index_thales_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thales_get_serialize( + _param = self._index_tencent_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281757,7 +281758,7 @@ def index_thales_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", '404': "str", '500': "str", } @@ -281768,7 +281769,7 @@ def index_thales_get_without_preload_content( return response_data.response - def _index_thales_get_serialize( + def _index_tencent_get_serialize( self, page, limit, @@ -281936,7 +281937,7 @@ def _index_thales_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/thales', + resource_path='/v3/index/tencent', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -281953,7 +281954,7 @@ def _index_thales_get_serialize( @validate_call - def index_themissinglink_get( + def index_thales_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281991,10 +281992,10 @@ def index_themissinglink_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination: - """Return vulnerability data stored in index \"themissinglink\" + ) -> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination: + """Return vulnerability data stored in index \"thales\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` :param page: set the page number of the response :type page: int @@ -282066,7 +282067,7 @@ def index_themissinglink_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_themissinglink_get_serialize( + _param = self._index_thales_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282098,7 +282099,7 @@ def index_themissinglink_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", '404': "str", '500': "str", } @@ -282114,7 +282115,7 @@ def index_themissinglink_get( @validate_call - def index_themissinglink_get_with_http_info( + def index_thales_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282152,10 +282153,10 @@ def index_themissinglink_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination]: - """Return vulnerability data stored in index \"themissinglink\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination]: + """Return vulnerability data stored in index \"thales\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` :param page: set the page number of the response :type page: int @@ -282227,7 +282228,7 @@ def index_themissinglink_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_themissinglink_get_serialize( + _param = self._index_thales_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282259,7 +282260,7 @@ def index_themissinglink_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", '404': "str", '500': "str", } @@ -282275,7 +282276,7 @@ def index_themissinglink_get_with_http_info( @validate_call - def index_themissinglink_get_without_preload_content( + def index_thales_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282314,9 +282315,9 @@ def index_themissinglink_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"themissinglink\" + """Return vulnerability data stored in index \"thales\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` :param page: set the page number of the response :type page: int @@ -282388,7 +282389,7 @@ def index_themissinglink_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_themissinglink_get_serialize( + _param = self._index_thales_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282420,7 +282421,7 @@ def index_themissinglink_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", '404': "str", '500': "str", } @@ -282431,7 +282432,7 @@ def index_themissinglink_get_without_preload_content( return response_data.response - def _index_themissinglink_get_serialize( + def _index_thales_get_serialize( self, page, limit, @@ -282599,7 +282600,7 @@ def _index_themissinglink_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/themissinglink', + resource_path='/v3/index/thales', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -282616,7 +282617,7 @@ def _index_themissinglink_get_serialize( @validate_call - def index_thermo_fisher_get( + def index_themissinglink_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282654,10 +282655,10 @@ def index_thermo_fisher_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination: - """Return vulnerability data stored in index \"thermo-fisher\" + ) -> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination: + """Return vulnerability data stored in index \"themissinglink\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` :param page: set the page number of the response :type page: int @@ -282729,7 +282730,7 @@ def index_thermo_fisher_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thermo_fisher_get_serialize( + _param = self._index_themissinglink_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282761,7 +282762,7 @@ def index_thermo_fisher_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", '404': "str", '500': "str", } @@ -282777,7 +282778,7 @@ def index_thermo_fisher_get( @validate_call - def index_thermo_fisher_get_with_http_info( + def index_themissinglink_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282815,10 +282816,10 @@ def index_thermo_fisher_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination]: - """Return vulnerability data stored in index \"thermo-fisher\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination]: + """Return vulnerability data stored in index \"themissinglink\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` :param page: set the page number of the response :type page: int @@ -282890,7 +282891,7 @@ def index_thermo_fisher_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thermo_fisher_get_serialize( + _param = self._index_themissinglink_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282922,7 +282923,7 @@ def index_thermo_fisher_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", '404': "str", '500': "str", } @@ -282938,7 +282939,7 @@ def index_thermo_fisher_get_with_http_info( @validate_call - def index_thermo_fisher_get_without_preload_content( + def index_themissinglink_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282977,9 +282978,9 @@ def index_thermo_fisher_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"thermo-fisher\" + """Return vulnerability data stored in index \"themissinglink\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` :param page: set the page number of the response :type page: int @@ -283051,7 +283052,7 @@ def index_thermo_fisher_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thermo_fisher_get_serialize( + _param = self._index_themissinglink_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283083,7 +283084,7 @@ def index_thermo_fisher_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", '404': "str", '500': "str", } @@ -283094,7 +283095,7 @@ def index_thermo_fisher_get_without_preload_content( return response_data.response - def _index_thermo_fisher_get_serialize( + def _index_themissinglink_get_serialize( self, page, limit, @@ -283262,7 +283263,7 @@ def _index_thermo_fisher_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/thermo-fisher', + resource_path='/v3/index/themissinglink', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -283279,7 +283280,7 @@ def _index_thermo_fisher_get_serialize( @validate_call - def index_threat_actors_get( + def index_thermo_fisher_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283317,10 +283318,10 @@ def index_threat_actors_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination: - """Return vulnerability data stored in index \"threat-actors\" + ) -> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination: + """Return vulnerability data stored in index \"thermo-fisher\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` :param page: set the page number of the response :type page: int @@ -283392,7 +283393,7 @@ def index_threat_actors_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_threat_actors_get_serialize( + _param = self._index_thermo_fisher_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283424,7 +283425,7 @@ def index_threat_actors_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", '404': "str", '500': "str", } @@ -283440,7 +283441,7 @@ def index_threat_actors_get( @validate_call - def index_threat_actors_get_with_http_info( + def index_thermo_fisher_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283478,10 +283479,10 @@ def index_threat_actors_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination]: - """Return vulnerability data stored in index \"threat-actors\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination]: + """Return vulnerability data stored in index \"thermo-fisher\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` :param page: set the page number of the response :type page: int @@ -283553,7 +283554,7 @@ def index_threat_actors_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_threat_actors_get_serialize( + _param = self._index_thermo_fisher_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283585,7 +283586,7 @@ def index_threat_actors_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", '404': "str", '500': "str", } @@ -283601,7 +283602,7 @@ def index_threat_actors_get_with_http_info( @validate_call - def index_threat_actors_get_without_preload_content( + def index_thermo_fisher_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283640,9 +283641,9 @@ def index_threat_actors_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"threat-actors\" + """Return vulnerability data stored in index \"thermo-fisher\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` :param page: set the page number of the response :type page: int @@ -283714,7 +283715,7 @@ def index_threat_actors_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_threat_actors_get_serialize( + _param = self._index_thermo_fisher_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283746,7 +283747,7 @@ def index_threat_actors_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", '404': "str", '500': "str", } @@ -283757,7 +283758,7 @@ def index_threat_actors_get_without_preload_content( return response_data.response - def _index_threat_actors_get_serialize( + def _index_thermo_fisher_get_serialize( self, page, limit, @@ -283925,7 +283926,7 @@ def _index_threat_actors_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/threat-actors', + resource_path='/v3/index/thermo-fisher', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -283942,7 +283943,7 @@ def _index_threat_actors_get_serialize( @validate_call - def index_ti_get( + def index_threat_actors_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283980,10 +283981,10 @@ def index_ti_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination: - """Return vulnerability data stored in index \"ti\" + ) -> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination: + """Return vulnerability data stored in index \"threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -284055,7 +284056,7 @@ def index_ti_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ti_get_serialize( + _param = self._index_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284087,7 +284088,7 @@ def index_ti_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", '404': "str", '500': "str", } @@ -284103,7 +284104,7 @@ def index_ti_get( @validate_call - def index_ti_get_with_http_info( + def index_threat_actors_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284141,10 +284142,10 @@ def index_ti_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination]: - """Return vulnerability data stored in index \"ti\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination]: + """Return vulnerability data stored in index \"threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -284216,7 +284217,7 @@ def index_ti_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ti_get_serialize( + _param = self._index_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284248,7 +284249,7 @@ def index_ti_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", '404': "str", '500': "str", } @@ -284264,7 +284265,7 @@ def index_ti_get_with_http_info( @validate_call - def index_ti_get_without_preload_content( + def index_threat_actors_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284303,9 +284304,9 @@ def index_ti_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ti\" + """Return vulnerability data stored in index \"threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -284377,7 +284378,7 @@ def index_ti_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ti_get_serialize( + _param = self._index_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284409,7 +284410,7 @@ def index_ti_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", '404': "str", '500': "str", } @@ -284420,7 +284421,7 @@ def index_ti_get_without_preload_content( return response_data.response - def _index_ti_get_serialize( + def _index_threat_actors_get_serialize( self, page, limit, @@ -284588,7 +284589,7 @@ def _index_ti_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ti', + resource_path='/v3/index/threat-actors', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -284605,7 +284606,7 @@ def _index_ti_get_serialize( @validate_call - def index_tibco_get( + def index_ti_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284643,10 +284644,10 @@ def index_tibco_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination: - """Return vulnerability data stored in index \"tibco\" + ) -> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination: + """Return vulnerability data stored in index \"ti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` :param page: set the page number of the response :type page: int @@ -284718,7 +284719,7 @@ def index_tibco_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tibco_get_serialize( + _param = self._index_ti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284750,7 +284751,7 @@ def index_tibco_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", '404': "str", '500': "str", } @@ -284766,7 +284767,7 @@ def index_tibco_get( @validate_call - def index_tibco_get_with_http_info( + def index_ti_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284804,10 +284805,10 @@ def index_tibco_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination]: - """Return vulnerability data stored in index \"tibco\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination]: + """Return vulnerability data stored in index \"ti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` :param page: set the page number of the response :type page: int @@ -284879,7 +284880,7 @@ def index_tibco_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tibco_get_serialize( + _param = self._index_ti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284911,7 +284912,7 @@ def index_tibco_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", '404': "str", '500': "str", } @@ -284927,7 +284928,7 @@ def index_tibco_get_with_http_info( @validate_call - def index_tibco_get_without_preload_content( + def index_ti_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284966,9 +284967,9 @@ def index_tibco_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tibco\" + """Return vulnerability data stored in index \"ti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` :param page: set the page number of the response :type page: int @@ -285040,7 +285041,7 @@ def index_tibco_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tibco_get_serialize( + _param = self._index_ti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285072,7 +285073,7 @@ def index_tibco_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", '404': "str", '500': "str", } @@ -285083,7 +285084,7 @@ def index_tibco_get_without_preload_content( return response_data.response - def _index_tibco_get_serialize( + def _index_ti_get_serialize( self, page, limit, @@ -285251,7 +285252,7 @@ def _index_tibco_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tibco', + resource_path='/v3/index/ti', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -285268,7 +285269,7 @@ def _index_tibco_get_serialize( @validate_call - def index_tp_link_get( + def index_tibco_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285306,10 +285307,10 @@ def index_tp_link_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination: - """Return vulnerability data stored in index \"tp-link\" + ) -> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination: + """Return vulnerability data stored in index \"tibco\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` :param page: set the page number of the response :type page: int @@ -285381,7 +285382,7 @@ def index_tp_link_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tp_link_get_serialize( + _param = self._index_tibco_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285413,7 +285414,7 @@ def index_tp_link_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", '404': "str", '500': "str", } @@ -285429,7 +285430,7 @@ def index_tp_link_get( @validate_call - def index_tp_link_get_with_http_info( + def index_tibco_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285467,10 +285468,10 @@ def index_tp_link_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination]: - """Return vulnerability data stored in index \"tp-link\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination]: + """Return vulnerability data stored in index \"tibco\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` :param page: set the page number of the response :type page: int @@ -285542,7 +285543,7 @@ def index_tp_link_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tp_link_get_serialize( + _param = self._index_tibco_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285574,7 +285575,7 @@ def index_tp_link_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", '404': "str", '500': "str", } @@ -285590,7 +285591,7 @@ def index_tp_link_get_with_http_info( @validate_call - def index_tp_link_get_without_preload_content( + def index_tibco_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285629,9 +285630,9 @@ def index_tp_link_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tp-link\" + """Return vulnerability data stored in index \"tibco\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` :param page: set the page number of the response :type page: int @@ -285703,7 +285704,7 @@ def index_tp_link_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tp_link_get_serialize( + _param = self._index_tibco_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285735,7 +285736,7 @@ def index_tp_link_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", '404': "str", '500': "str", } @@ -285746,7 +285747,7 @@ def index_tp_link_get_without_preload_content( return response_data.response - def _index_tp_link_get_serialize( + def _index_tibco_get_serialize( self, page, limit, @@ -285914,7 +285915,7 @@ def _index_tp_link_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tp-link', + resource_path='/v3/index/tibco', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -285931,7 +285932,7 @@ def _index_tp_link_get_serialize( @validate_call - def index_trane_technology_get( + def index_tp_link_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285969,10 +285970,10 @@ def index_trane_technology_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination: - """Return vulnerability data stored in index \"trane-technology\" + ) -> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination: + """Return vulnerability data stored in index \"tp-link\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` :param page: set the page number of the response :type page: int @@ -286044,7 +286045,7 @@ def index_trane_technology_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trane_technology_get_serialize( + _param = self._index_tp_link_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286076,7 +286077,7 @@ def index_trane_technology_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", '404': "str", '500': "str", } @@ -286092,7 +286093,7 @@ def index_trane_technology_get( @validate_call - def index_trane_technology_get_with_http_info( + def index_tp_link_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286130,10 +286131,10 @@ def index_trane_technology_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination]: - """Return vulnerability data stored in index \"trane-technology\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination]: + """Return vulnerability data stored in index \"tp-link\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` :param page: set the page number of the response :type page: int @@ -286205,7 +286206,7 @@ def index_trane_technology_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trane_technology_get_serialize( + _param = self._index_tp_link_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286237,7 +286238,7 @@ def index_trane_technology_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", '404': "str", '500': "str", } @@ -286253,7 +286254,7 @@ def index_trane_technology_get_with_http_info( @validate_call - def index_trane_technology_get_without_preload_content( + def index_tp_link_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286292,9 +286293,9 @@ def index_trane_technology_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"trane-technology\" + """Return vulnerability data stored in index \"tp-link\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` :param page: set the page number of the response :type page: int @@ -286366,7 +286367,7 @@ def index_trane_technology_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trane_technology_get_serialize( + _param = self._index_tp_link_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286398,7 +286399,7 @@ def index_trane_technology_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", '404': "str", '500': "str", } @@ -286409,7 +286410,7 @@ def index_trane_technology_get_without_preload_content( return response_data.response - def _index_trane_technology_get_serialize( + def _index_tp_link_get_serialize( self, page, limit, @@ -286577,7 +286578,7 @@ def _index_trane_technology_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/trane-technology', + resource_path='/v3/index/tp-link', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -286594,7 +286595,7 @@ def _index_trane_technology_get_serialize( @validate_call - def index_trendmicro_get( + def index_trane_technology_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286632,10 +286633,10 @@ def index_trendmicro_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination: - """Return vulnerability data stored in index \"trendmicro\" + ) -> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination: + """Return vulnerability data stored in index \"trane-technology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` :param page: set the page number of the response :type page: int @@ -286707,7 +286708,7 @@ def index_trendmicro_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trendmicro_get_serialize( + _param = self._index_trane_technology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286739,7 +286740,7 @@ def index_trendmicro_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", '404': "str", '500': "str", } @@ -286755,7 +286756,7 @@ def index_trendmicro_get( @validate_call - def index_trendmicro_get_with_http_info( + def index_trane_technology_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286793,10 +286794,10 @@ def index_trendmicro_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination]: - """Return vulnerability data stored in index \"trendmicro\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination]: + """Return vulnerability data stored in index \"trane-technology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` :param page: set the page number of the response :type page: int @@ -286868,7 +286869,7 @@ def index_trendmicro_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trendmicro_get_serialize( + _param = self._index_trane_technology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286900,7 +286901,7 @@ def index_trendmicro_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", '404': "str", '500': "str", } @@ -286916,7 +286917,7 @@ def index_trendmicro_get_with_http_info( @validate_call - def index_trendmicro_get_without_preload_content( + def index_trane_technology_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286955,9 +286956,9 @@ def index_trendmicro_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"trendmicro\" + """Return vulnerability data stored in index \"trane-technology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` :param page: set the page number of the response :type page: int @@ -287029,7 +287030,7 @@ def index_trendmicro_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trendmicro_get_serialize( + _param = self._index_trane_technology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287061,7 +287062,7 @@ def index_trendmicro_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", '404': "str", '500': "str", } @@ -287072,7 +287073,7 @@ def index_trendmicro_get_without_preload_content( return response_data.response - def _index_trendmicro_get_serialize( + def _index_trane_technology_get_serialize( self, page, limit, @@ -287240,7 +287241,7 @@ def _index_trendmicro_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/trendmicro', + resource_path='/v3/index/trane-technology', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -287257,7 +287258,7 @@ def _index_trendmicro_get_serialize( @validate_call - def index_trustwave_get( + def index_trendmicro_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287295,10 +287296,10 @@ def index_trustwave_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination: - """Return vulnerability data stored in index \"trustwave\" + ) -> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination: + """Return vulnerability data stored in index \"trendmicro\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` :param page: set the page number of the response :type page: int @@ -287370,7 +287371,7 @@ def index_trustwave_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trustwave_get_serialize( + _param = self._index_trendmicro_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287402,7 +287403,7 @@ def index_trustwave_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", '404': "str", '500': "str", } @@ -287418,7 +287419,7 @@ def index_trustwave_get( @validate_call - def index_trustwave_get_with_http_info( + def index_trendmicro_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287456,10 +287457,10 @@ def index_trustwave_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination]: - """Return vulnerability data stored in index \"trustwave\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination]: + """Return vulnerability data stored in index \"trendmicro\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` :param page: set the page number of the response :type page: int @@ -287531,7 +287532,7 @@ def index_trustwave_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trustwave_get_serialize( + _param = self._index_trendmicro_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287563,7 +287564,7 @@ def index_trustwave_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", '404': "str", '500': "str", } @@ -287579,7 +287580,7 @@ def index_trustwave_get_with_http_info( @validate_call - def index_trustwave_get_without_preload_content( + def index_trendmicro_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287618,9 +287619,9 @@ def index_trustwave_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"trustwave\" + """Return vulnerability data stored in index \"trendmicro\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` :param page: set the page number of the response :type page: int @@ -287692,7 +287693,7 @@ def index_trustwave_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trustwave_get_serialize( + _param = self._index_trendmicro_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287724,7 +287725,7 @@ def index_trustwave_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", '404': "str", '500': "str", } @@ -287735,7 +287736,7 @@ def index_trustwave_get_without_preload_content( return response_data.response - def _index_trustwave_get_serialize( + def _index_trendmicro_get_serialize( self, page, limit, @@ -287903,7 +287904,7 @@ def _index_trustwave_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/trustwave', + resource_path='/v3/index/trendmicro', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -287920,7 +287921,7 @@ def _index_trustwave_get_serialize( @validate_call - def index_twcert_get( + def index_trustwave_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287958,10 +287959,10 @@ def index_twcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"twcert\" + ) -> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination: + """Return vulnerability data stored in index \"trustwave\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` :param page: set the page number of the response :type page: int @@ -288033,7 +288034,7 @@ def index_twcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_twcert_get_serialize( + _param = self._index_trustwave_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288065,7 +288066,7 @@ def index_twcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", '404': "str", '500': "str", } @@ -288081,7 +288082,7 @@ def index_twcert_get( @validate_call - def index_twcert_get_with_http_info( + def index_trustwave_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288119,10 +288120,10 @@ def index_twcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"twcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination]: + """Return vulnerability data stored in index \"trustwave\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` :param page: set the page number of the response :type page: int @@ -288194,7 +288195,7 @@ def index_twcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_twcert_get_serialize( + _param = self._index_trustwave_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288226,7 +288227,7 @@ def index_twcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", '404': "str", '500': "str", } @@ -288242,7 +288243,7 @@ def index_twcert_get_with_http_info( @validate_call - def index_twcert_get_without_preload_content( + def index_trustwave_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288281,9 +288282,9 @@ def index_twcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"twcert\" + """Return vulnerability data stored in index \"trustwave\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` :param page: set the page number of the response :type page: int @@ -288355,7 +288356,7 @@ def index_twcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_twcert_get_serialize( + _param = self._index_trustwave_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288387,7 +288388,7 @@ def index_twcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", '404': "str", '500': "str", } @@ -288398,7 +288399,7 @@ def index_twcert_get_without_preload_content( return response_data.response - def _index_twcert_get_serialize( + def _index_trustwave_get_serialize( self, page, limit, @@ -288566,7 +288567,7 @@ def _index_twcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/twcert', + resource_path='/v3/index/trustwave', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -288583,7 +288584,7 @@ def _index_twcert_get_serialize( @validate_call - def index_ubiquiti_get( + def index_twcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288621,10 +288622,10 @@ def index_ubiquiti_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination: - """Return vulnerability data stored in index \"ubiquiti\" + ) -> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"twcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` :param page: set the page number of the response :type page: int @@ -288696,7 +288697,7 @@ def index_ubiquiti_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubiquiti_get_serialize( + _param = self._index_twcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288728,7 +288729,7 @@ def index_ubiquiti_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -288744,7 +288745,7 @@ def index_ubiquiti_get( @validate_call - def index_ubiquiti_get_with_http_info( + def index_twcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288782,10 +288783,10 @@ def index_ubiquiti_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination]: - """Return vulnerability data stored in index \"ubiquiti\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"twcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` :param page: set the page number of the response :type page: int @@ -288857,7 +288858,7 @@ def index_ubiquiti_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubiquiti_get_serialize( + _param = self._index_twcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288889,7 +288890,7 @@ def index_ubiquiti_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -288905,7 +288906,7 @@ def index_ubiquiti_get_with_http_info( @validate_call - def index_ubiquiti_get_without_preload_content( + def index_twcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288944,9 +288945,9 @@ def index_ubiquiti_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ubiquiti\" + """Return vulnerability data stored in index \"twcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` :param page: set the page number of the response :type page: int @@ -289018,7 +289019,7 @@ def index_ubiquiti_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubiquiti_get_serialize( + _param = self._index_twcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289050,7 +289051,7 @@ def index_ubiquiti_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -289061,7 +289062,7 @@ def index_ubiquiti_get_without_preload_content( return response_data.response - def _index_ubiquiti_get_serialize( + def _index_twcert_get_serialize( self, page, limit, @@ -289229,7 +289230,7 @@ def _index_ubiquiti_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ubiquiti', + resource_path='/v3/index/twcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -289246,7 +289247,7 @@ def _index_ubiquiti_get_serialize( @validate_call - def index_ubuntu_get( + def index_ubiquiti_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289284,10 +289285,10 @@ def index_ubuntu_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination: - """Return vulnerability data stored in index \"ubuntu\" + ) -> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination: + """Return vulnerability data stored in index \"ubiquiti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` :param page: set the page number of the response :type page: int @@ -289359,7 +289360,7 @@ def index_ubuntu_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_get_serialize( + _param = self._index_ubiquiti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289391,7 +289392,7 @@ def index_ubuntu_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", '404': "str", '500': "str", } @@ -289407,7 +289408,7 @@ def index_ubuntu_get( @validate_call - def index_ubuntu_get_with_http_info( + def index_ubiquiti_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289445,10 +289446,10 @@ def index_ubuntu_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination]: - """Return vulnerability data stored in index \"ubuntu\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination]: + """Return vulnerability data stored in index \"ubiquiti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` :param page: set the page number of the response :type page: int @@ -289520,7 +289521,7 @@ def index_ubuntu_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_get_serialize( + _param = self._index_ubiquiti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289552,7 +289553,7 @@ def index_ubuntu_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", '404': "str", '500': "str", } @@ -289568,7 +289569,7 @@ def index_ubuntu_get_with_http_info( @validate_call - def index_ubuntu_get_without_preload_content( + def index_ubiquiti_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289607,9 +289608,9 @@ def index_ubuntu_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ubuntu\" + """Return vulnerability data stored in index \"ubiquiti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` :param page: set the page number of the response :type page: int @@ -289681,7 +289682,7 @@ def index_ubuntu_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_get_serialize( + _param = self._index_ubiquiti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289713,7 +289714,7 @@ def index_ubuntu_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", '404': "str", '500': "str", } @@ -289724,7 +289725,7 @@ def index_ubuntu_get_without_preload_content( return response_data.response - def _index_ubuntu_get_serialize( + def _index_ubiquiti_get_serialize( self, page, limit, @@ -289892,7 +289893,7 @@ def _index_ubuntu_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ubuntu', + resource_path='/v3/index/ubiquiti', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -289909,7 +289910,7 @@ def _index_ubuntu_get_serialize( @validate_call - def index_ubuntu_purls_get( + def index_ubuntu_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289947,10 +289948,10 @@ def index_ubuntu_purls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: - """Return vulnerability data stored in index \"ubuntu-purls\" + ) -> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination: + """Return vulnerability data stored in index \"ubuntu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` :param page: set the page number of the response :type page: int @@ -290022,7 +290023,7 @@ def index_ubuntu_purls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_purls_get_serialize( + _param = self._index_ubuntu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290054,7 +290055,7 @@ def index_ubuntu_purls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", '404': "str", '500': "str", } @@ -290070,7 +290071,7 @@ def index_ubuntu_purls_get( @validate_call - def index_ubuntu_purls_get_with_http_info( + def index_ubuntu_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290108,10 +290109,10 @@ def index_ubuntu_purls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: - """Return vulnerability data stored in index \"ubuntu-purls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination]: + """Return vulnerability data stored in index \"ubuntu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` :param page: set the page number of the response :type page: int @@ -290183,7 +290184,7 @@ def index_ubuntu_purls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_purls_get_serialize( + _param = self._index_ubuntu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290215,7 +290216,7 @@ def index_ubuntu_purls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", '404': "str", '500': "str", } @@ -290231,7 +290232,7 @@ def index_ubuntu_purls_get_with_http_info( @validate_call - def index_ubuntu_purls_get_without_preload_content( + def index_ubuntu_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290270,9 +290271,9 @@ def index_ubuntu_purls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ubuntu-purls\" + """Return vulnerability data stored in index \"ubuntu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` :param page: set the page number of the response :type page: int @@ -290344,7 +290345,7 @@ def index_ubuntu_purls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_purls_get_serialize( + _param = self._index_ubuntu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290376,7 +290377,7 @@ def index_ubuntu_purls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", '404': "str", '500': "str", } @@ -290387,7 +290388,7 @@ def index_ubuntu_purls_get_without_preload_content( return response_data.response - def _index_ubuntu_purls_get_serialize( + def _index_ubuntu_get_serialize( self, page, limit, @@ -290555,7 +290556,7 @@ def _index_ubuntu_purls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ubuntu-purls', + resource_path='/v3/index/ubuntu', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -290572,7 +290573,7 @@ def _index_ubuntu_purls_get_serialize( @validate_call - def index_unify_get( + def index_ubuntu_purls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290610,10 +290611,10 @@ def index_unify_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination: - """Return vulnerability data stored in index \"unify\" + ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: + """Return vulnerability data stored in index \"ubuntu-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` :param page: set the page number of the response :type page: int @@ -290685,7 +290686,7 @@ def index_unify_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unify_get_serialize( + _param = self._index_ubuntu_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290717,7 +290718,7 @@ def index_unify_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -290733,7 +290734,7 @@ def index_unify_get( @validate_call - def index_unify_get_with_http_info( + def index_ubuntu_purls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290771,10 +290772,10 @@ def index_unify_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination]: - """Return vulnerability data stored in index \"unify\" + ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: + """Return vulnerability data stored in index \"ubuntu-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` :param page: set the page number of the response :type page: int @@ -290846,7 +290847,7 @@ def index_unify_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unify_get_serialize( + _param = self._index_ubuntu_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290878,7 +290879,7 @@ def index_unify_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -290894,7 +290895,7 @@ def index_unify_get_with_http_info( @validate_call - def index_unify_get_without_preload_content( + def index_ubuntu_purls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290933,9 +290934,9 @@ def index_unify_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"unify\" + """Return vulnerability data stored in index \"ubuntu-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` :param page: set the page number of the response :type page: int @@ -291007,7 +291008,7 @@ def index_unify_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unify_get_serialize( + _param = self._index_ubuntu_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291039,7 +291040,7 @@ def index_unify_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -291050,7 +291051,7 @@ def index_unify_get_without_preload_content( return response_data.response - def _index_unify_get_serialize( + def _index_ubuntu_purls_get_serialize( self, page, limit, @@ -291218,7 +291219,7 @@ def _index_unify_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/unify', + resource_path='/v3/index/ubuntu-purls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -291235,7 +291236,7 @@ def _index_unify_get_serialize( @validate_call - def index_unisoc_get( + def index_unify_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291273,10 +291274,10 @@ def index_unisoc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination: - """Return vulnerability data stored in index \"unisoc\" + ) -> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination: + """Return vulnerability data stored in index \"unify\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` :param page: set the page number of the response :type page: int @@ -291348,7 +291349,7 @@ def index_unisoc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unisoc_get_serialize( + _param = self._index_unify_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291380,7 +291381,7 @@ def index_unisoc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", '404': "str", '500': "str", } @@ -291396,7 +291397,7 @@ def index_unisoc_get( @validate_call - def index_unisoc_get_with_http_info( + def index_unify_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291434,10 +291435,10 @@ def index_unisoc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination]: - """Return vulnerability data stored in index \"unisoc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination]: + """Return vulnerability data stored in index \"unify\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` :param page: set the page number of the response :type page: int @@ -291509,7 +291510,7 @@ def index_unisoc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unisoc_get_serialize( + _param = self._index_unify_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291541,7 +291542,7 @@ def index_unisoc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", '404': "str", '500': "str", } @@ -291557,7 +291558,7 @@ def index_unisoc_get_with_http_info( @validate_call - def index_unisoc_get_without_preload_content( + def index_unify_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291596,9 +291597,9 @@ def index_unisoc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"unisoc\" + """Return vulnerability data stored in index \"unify\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` :param page: set the page number of the response :type page: int @@ -291670,7 +291671,7 @@ def index_unisoc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unisoc_get_serialize( + _param = self._index_unify_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291702,7 +291703,7 @@ def index_unisoc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", '404': "str", '500': "str", } @@ -291713,7 +291714,7 @@ def index_unisoc_get_without_preload_content( return response_data.response - def _index_unisoc_get_serialize( + def _index_unify_get_serialize( self, page, limit, @@ -291881,7 +291882,7 @@ def _index_unisoc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/unisoc', + resource_path='/v3/index/unify', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -291898,7 +291899,7 @@ def _index_unisoc_get_serialize( @validate_call - def index_usd_get( + def index_unisoc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291936,10 +291937,10 @@ def index_usd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination: - """Return vulnerability data stored in index \"usd\" + ) -> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination: + """Return vulnerability data stored in index \"unisoc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` :param page: set the page number of the response :type page: int @@ -292011,7 +292012,7 @@ def index_usd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usd_get_serialize( + _param = self._index_unisoc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292043,7 +292044,7 @@ def index_usd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", '404': "str", '500': "str", } @@ -292059,7 +292060,7 @@ def index_usd_get( @validate_call - def index_usd_get_with_http_info( + def index_unisoc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292097,10 +292098,10 @@ def index_usd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination]: - """Return vulnerability data stored in index \"usd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination]: + """Return vulnerability data stored in index \"unisoc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` :param page: set the page number of the response :type page: int @@ -292172,7 +292173,7 @@ def index_usd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usd_get_serialize( + _param = self._index_unisoc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292204,7 +292205,7 @@ def index_usd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", '404': "str", '500': "str", } @@ -292220,7 +292221,7 @@ def index_usd_get_with_http_info( @validate_call - def index_usd_get_without_preload_content( + def index_unisoc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292259,9 +292260,9 @@ def index_usd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"usd\" + """Return vulnerability data stored in index \"unisoc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` :param page: set the page number of the response :type page: int @@ -292333,7 +292334,7 @@ def index_usd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usd_get_serialize( + _param = self._index_unisoc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292365,7 +292366,7 @@ def index_usd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", '404': "str", '500': "str", } @@ -292376,7 +292377,7 @@ def index_usd_get_without_preload_content( return response_data.response - def _index_usd_get_serialize( + def _index_unisoc_get_serialize( self, page, limit, @@ -292544,7 +292545,7 @@ def _index_usd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/usd', + resource_path='/v3/index/unisoc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -292561,7 +292562,7 @@ def _index_usd_get_serialize( @validate_call - def index_usom_get( + def index_usd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292599,10 +292600,10 @@ def index_usom_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"usom\" + ) -> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination: + """Return vulnerability data stored in index \"usd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` :param page: set the page number of the response :type page: int @@ -292674,7 +292675,7 @@ def index_usom_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usom_get_serialize( + _param = self._index_usd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292706,7 +292707,7 @@ def index_usom_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", '404': "str", '500': "str", } @@ -292722,7 +292723,7 @@ def index_usom_get( @validate_call - def index_usom_get_with_http_info( + def index_usd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292760,10 +292761,10 @@ def index_usom_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"usom\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination]: + """Return vulnerability data stored in index \"usd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` :param page: set the page number of the response :type page: int @@ -292835,7 +292836,7 @@ def index_usom_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usom_get_serialize( + _param = self._index_usd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292867,7 +292868,7 @@ def index_usom_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", '404': "str", '500': "str", } @@ -292883,7 +292884,7 @@ def index_usom_get_with_http_info( @validate_call - def index_usom_get_without_preload_content( + def index_usd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292922,9 +292923,9 @@ def index_usom_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"usom\" + """Return vulnerability data stored in index \"usd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` :param page: set the page number of the response :type page: int @@ -292996,7 +292997,7 @@ def index_usom_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usom_get_serialize( + _param = self._index_usd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293028,7 +293029,7 @@ def index_usom_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", '404': "str", '500': "str", } @@ -293039,7 +293040,7 @@ def index_usom_get_without_preload_content( return response_data.response - def _index_usom_get_serialize( + def _index_usd_get_serialize( self, page, limit, @@ -293207,7 +293208,7 @@ def _index_usom_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/usom', + resource_path='/v3/index/usd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -293224,7 +293225,7 @@ def _index_usom_get_serialize( @validate_call - def index_vandyke_get( + def index_usom_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293262,10 +293263,10 @@ def index_vandyke_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination: - """Return vulnerability data stored in index \"vandyke\" + ) -> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"usom\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` :param page: set the page number of the response :type page: int @@ -293337,7 +293338,7 @@ def index_vandyke_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vandyke_get_serialize( + _param = self._index_usom_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293369,7 +293370,7 @@ def index_vandyke_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -293385,7 +293386,7 @@ def index_vandyke_get( @validate_call - def index_vandyke_get_with_http_info( + def index_usom_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293423,10 +293424,10 @@ def index_vandyke_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination]: - """Return vulnerability data stored in index \"vandyke\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"usom\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` :param page: set the page number of the response :type page: int @@ -293498,7 +293499,7 @@ def index_vandyke_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vandyke_get_serialize( + _param = self._index_usom_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293530,7 +293531,7 @@ def index_vandyke_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -293546,7 +293547,7 @@ def index_vandyke_get_with_http_info( @validate_call - def index_vandyke_get_without_preload_content( + def index_usom_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293585,9 +293586,9 @@ def index_vandyke_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vandyke\" + """Return vulnerability data stored in index \"usom\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` :param page: set the page number of the response :type page: int @@ -293659,7 +293660,7 @@ def index_vandyke_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vandyke_get_serialize( + _param = self._index_usom_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293691,7 +293692,7 @@ def index_vandyke_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -293702,7 +293703,7 @@ def index_vandyke_get_without_preload_content( return response_data.response - def _index_vandyke_get_serialize( + def _index_usom_get_serialize( self, page, limit, @@ -293870,7 +293871,7 @@ def _index_vandyke_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vandyke', + resource_path='/v3/index/usom', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -293887,7 +293888,7 @@ def _index_vandyke_get_serialize( @validate_call - def index_vapidlabs_get( + def index_vandyke_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293925,10 +293926,10 @@ def index_vapidlabs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vapidlabs\" + ) -> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination: + """Return vulnerability data stored in index \"vandyke\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` :param page: set the page number of the response :type page: int @@ -294000,7 +294001,7 @@ def index_vapidlabs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vapidlabs_get_serialize( + _param = self._index_vandyke_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294032,7 +294033,7 @@ def index_vapidlabs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", '404': "str", '500': "str", } @@ -294048,7 +294049,7 @@ def index_vapidlabs_get( @validate_call - def index_vapidlabs_get_with_http_info( + def index_vandyke_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294086,10 +294087,10 @@ def index_vapidlabs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vapidlabs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination]: + """Return vulnerability data stored in index \"vandyke\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` :param page: set the page number of the response :type page: int @@ -294161,7 +294162,7 @@ def index_vapidlabs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vapidlabs_get_serialize( + _param = self._index_vandyke_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294193,7 +294194,7 @@ def index_vapidlabs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", '404': "str", '500': "str", } @@ -294209,7 +294210,7 @@ def index_vapidlabs_get_with_http_info( @validate_call - def index_vapidlabs_get_without_preload_content( + def index_vandyke_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294248,9 +294249,9 @@ def index_vapidlabs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vapidlabs\" + """Return vulnerability data stored in index \"vandyke\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` :param page: set the page number of the response :type page: int @@ -294322,7 +294323,7 @@ def index_vapidlabs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vapidlabs_get_serialize( + _param = self._index_vandyke_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294354,7 +294355,7 @@ def index_vapidlabs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", '404': "str", '500': "str", } @@ -294365,7 +294366,7 @@ def index_vapidlabs_get_without_preload_content( return response_data.response - def _index_vapidlabs_get_serialize( + def _index_vandyke_get_serialize( self, page, limit, @@ -294533,7 +294534,7 @@ def _index_vapidlabs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vapidlabs', + resource_path='/v3/index/vandyke', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -294550,7 +294551,7 @@ def _index_vapidlabs_get_serialize( @validate_call - def index_vc_cpe_dictionary_get( + def index_vapidlabs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294588,10 +294589,10 @@ def index_vc_cpe_dictionary_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination: - """Return vulnerability data stored in index \"vc-cpe-dictionary\" + ) -> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vapidlabs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` :param page: set the page number of the response :type page: int @@ -294663,7 +294664,7 @@ def index_vc_cpe_dictionary_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vc_cpe_dictionary_get_serialize( + _param = self._index_vapidlabs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294695,7 +294696,7 @@ def index_vc_cpe_dictionary_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -294711,7 +294712,7 @@ def index_vc_cpe_dictionary_get( @validate_call - def index_vc_cpe_dictionary_get_with_http_info( + def index_vapidlabs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294749,10 +294750,10 @@ def index_vc_cpe_dictionary_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination]: - """Return vulnerability data stored in index \"vc-cpe-dictionary\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vapidlabs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` :param page: set the page number of the response :type page: int @@ -294824,7 +294825,7 @@ def index_vc_cpe_dictionary_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vc_cpe_dictionary_get_serialize( + _param = self._index_vapidlabs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294856,7 +294857,7 @@ def index_vc_cpe_dictionary_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -294872,7 +294873,7 @@ def index_vc_cpe_dictionary_get_with_http_info( @validate_call - def index_vc_cpe_dictionary_get_without_preload_content( + def index_vapidlabs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294911,9 +294912,9 @@ def index_vc_cpe_dictionary_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vc-cpe-dictionary\" + """Return vulnerability data stored in index \"vapidlabs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` :param page: set the page number of the response :type page: int @@ -294985,7 +294986,7 @@ def index_vc_cpe_dictionary_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vc_cpe_dictionary_get_serialize( + _param = self._index_vapidlabs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295017,7 +295018,7 @@ def index_vc_cpe_dictionary_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -295028,7 +295029,7 @@ def index_vc_cpe_dictionary_get_without_preload_content( return response_data.response - def _index_vc_cpe_dictionary_get_serialize( + def _index_vapidlabs_get_serialize( self, page, limit, @@ -295196,7 +295197,7 @@ def _index_vc_cpe_dictionary_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vc-cpe-dictionary', + resource_path='/v3/index/vapidlabs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -295213,7 +295214,7 @@ def _index_vc_cpe_dictionary_get_serialize( @validate_call - def index_vde_get( + def index_vc_cpe_dictionary_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295251,10 +295252,10 @@ def index_vde_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vde\" + ) -> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination: + """Return vulnerability data stored in index \"vc-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -295326,7 +295327,7 @@ def index_vde_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vde_get_serialize( + _param = self._index_vc_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295358,7 +295359,7 @@ def index_vde_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -295374,7 +295375,7 @@ def index_vde_get( @validate_call - def index_vde_get_with_http_info( + def index_vc_cpe_dictionary_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295412,10 +295413,10 @@ def index_vde_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vde\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination]: + """Return vulnerability data stored in index \"vc-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -295487,7 +295488,7 @@ def index_vde_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vde_get_serialize( + _param = self._index_vc_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295519,7 +295520,7 @@ def index_vde_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -295535,7 +295536,7 @@ def index_vde_get_with_http_info( @validate_call - def index_vde_get_without_preload_content( + def index_vc_cpe_dictionary_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295574,9 +295575,9 @@ def index_vde_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vde\" + """Return vulnerability data stored in index \"vc-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -295648,7 +295649,7 @@ def index_vde_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vde_get_serialize( + _param = self._index_vc_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295680,7 +295681,7 @@ def index_vde_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -295691,7 +295692,7 @@ def index_vde_get_without_preload_content( return response_data.response - def _index_vde_get_serialize( + def _index_vc_cpe_dictionary_get_serialize( self, page, limit, @@ -295859,7 +295860,7 @@ def _index_vde_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vde', + resource_path='/v3/index/vc-cpe-dictionary', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -295876,7 +295877,7 @@ def _index_vde_get_serialize( @validate_call - def index_veeam_get( + def index_vde_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295914,10 +295915,10 @@ def index_veeam_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination: - """Return vulnerability data stored in index \"veeam\" + ) -> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vde\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` :param page: set the page number of the response :type page: int @@ -295989,7 +295990,7 @@ def index_veeam_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veeam_get_serialize( + _param = self._index_vde_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296021,7 +296022,7 @@ def index_veeam_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -296037,7 +296038,7 @@ def index_veeam_get( @validate_call - def index_veeam_get_with_http_info( + def index_vde_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296075,10 +296076,10 @@ def index_veeam_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination]: - """Return vulnerability data stored in index \"veeam\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vde\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` :param page: set the page number of the response :type page: int @@ -296150,7 +296151,7 @@ def index_veeam_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veeam_get_serialize( + _param = self._index_vde_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296182,7 +296183,7 @@ def index_veeam_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -296198,7 +296199,7 @@ def index_veeam_get_with_http_info( @validate_call - def index_veeam_get_without_preload_content( + def index_vde_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296237,9 +296238,9 @@ def index_veeam_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"veeam\" + """Return vulnerability data stored in index \"vde\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` :param page: set the page number of the response :type page: int @@ -296311,7 +296312,7 @@ def index_veeam_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veeam_get_serialize( + _param = self._index_vde_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296343,7 +296344,7 @@ def index_veeam_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -296354,7 +296355,7 @@ def index_veeam_get_without_preload_content( return response_data.response - def _index_veeam_get_serialize( + def _index_vde_get_serialize( self, page, limit, @@ -296522,7 +296523,7 @@ def _index_veeam_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/veeam', + resource_path='/v3/index/vde', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -296539,7 +296540,7 @@ def _index_veeam_get_serialize( @validate_call - def index_veritas_get( + def index_veeam_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296577,10 +296578,10 @@ def index_veritas_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination: - """Return vulnerability data stored in index \"veritas\" + ) -> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination: + """Return vulnerability data stored in index \"veeam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` :param page: set the page number of the response :type page: int @@ -296652,7 +296653,7 @@ def index_veritas_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veritas_get_serialize( + _param = self._index_veeam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296684,7 +296685,7 @@ def index_veritas_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", '404': "str", '500': "str", } @@ -296700,7 +296701,7 @@ def index_veritas_get( @validate_call - def index_veritas_get_with_http_info( + def index_veeam_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296738,10 +296739,10 @@ def index_veritas_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination]: - """Return vulnerability data stored in index \"veritas\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination]: + """Return vulnerability data stored in index \"veeam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` :param page: set the page number of the response :type page: int @@ -296813,7 +296814,7 @@ def index_veritas_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veritas_get_serialize( + _param = self._index_veeam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296845,7 +296846,7 @@ def index_veritas_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", '404': "str", '500': "str", } @@ -296861,7 +296862,7 @@ def index_veritas_get_with_http_info( @validate_call - def index_veritas_get_without_preload_content( + def index_veeam_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296900,9 +296901,9 @@ def index_veritas_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"veritas\" + """Return vulnerability data stored in index \"veeam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` :param page: set the page number of the response :type page: int @@ -296974,7 +296975,7 @@ def index_veritas_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veritas_get_serialize( + _param = self._index_veeam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297006,7 +297007,7 @@ def index_veritas_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", '404': "str", '500': "str", } @@ -297017,7 +297018,7 @@ def index_veritas_get_without_preload_content( return response_data.response - def _index_veritas_get_serialize( + def _index_veeam_get_serialize( self, page, limit, @@ -297185,7 +297186,7 @@ def _index_veritas_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/veritas', + resource_path='/v3/index/veeam', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -297202,7 +297203,7 @@ def _index_veritas_get_serialize( @validate_call - def index_virtuozzo_get( + def index_veritas_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297240,10 +297241,10 @@ def index_virtuozzo_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination: - """Return vulnerability data stored in index \"virtuozzo\" + ) -> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination: + """Return vulnerability data stored in index \"veritas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` :param page: set the page number of the response :type page: int @@ -297315,7 +297316,7 @@ def index_virtuozzo_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_virtuozzo_get_serialize( + _param = self._index_veritas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297347,7 +297348,7 @@ def index_virtuozzo_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", '404': "str", '500': "str", } @@ -297363,7 +297364,7 @@ def index_virtuozzo_get( @validate_call - def index_virtuozzo_get_with_http_info( + def index_veritas_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297401,10 +297402,10 @@ def index_virtuozzo_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination]: - """Return vulnerability data stored in index \"virtuozzo\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination]: + """Return vulnerability data stored in index \"veritas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` :param page: set the page number of the response :type page: int @@ -297476,7 +297477,7 @@ def index_virtuozzo_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_virtuozzo_get_serialize( + _param = self._index_veritas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297508,7 +297509,7 @@ def index_virtuozzo_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", '404': "str", '500': "str", } @@ -297524,7 +297525,7 @@ def index_virtuozzo_get_with_http_info( @validate_call - def index_virtuozzo_get_without_preload_content( + def index_veritas_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297563,9 +297564,9 @@ def index_virtuozzo_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"virtuozzo\" + """Return vulnerability data stored in index \"veritas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` :param page: set the page number of the response :type page: int @@ -297637,7 +297638,7 @@ def index_virtuozzo_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_virtuozzo_get_serialize( + _param = self._index_veritas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297669,7 +297670,7 @@ def index_virtuozzo_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", '404': "str", '500': "str", } @@ -297680,7 +297681,7 @@ def index_virtuozzo_get_without_preload_content( return response_data.response - def _index_virtuozzo_get_serialize( + def _index_veritas_get_serialize( self, page, limit, @@ -297848,7 +297849,7 @@ def _index_virtuozzo_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/virtuozzo', + resource_path='/v3/index/veritas', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -297865,7 +297866,7 @@ def _index_virtuozzo_get_serialize( @validate_call - def index_vlc_get( + def index_virtuozzo_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297903,10 +297904,10 @@ def index_vlc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination: - """Return vulnerability data stored in index \"vlc\" + ) -> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination: + """Return vulnerability data stored in index \"virtuozzo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` :param page: set the page number of the response :type page: int @@ -297978,7 +297979,7 @@ def index_vlc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vlc_get_serialize( + _param = self._index_virtuozzo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298010,7 +298011,7 @@ def index_vlc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", '404': "str", '500': "str", } @@ -298026,7 +298027,7 @@ def index_vlc_get( @validate_call - def index_vlc_get_with_http_info( + def index_virtuozzo_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298064,10 +298065,10 @@ def index_vlc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination]: - """Return vulnerability data stored in index \"vlc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination]: + """Return vulnerability data stored in index \"virtuozzo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` :param page: set the page number of the response :type page: int @@ -298139,7 +298140,7 @@ def index_vlc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vlc_get_serialize( + _param = self._index_virtuozzo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298171,7 +298172,7 @@ def index_vlc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", '404': "str", '500': "str", } @@ -298187,7 +298188,7 @@ def index_vlc_get_with_http_info( @validate_call - def index_vlc_get_without_preload_content( + def index_virtuozzo_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298226,9 +298227,9 @@ def index_vlc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vlc\" + """Return vulnerability data stored in index \"virtuozzo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` :param page: set the page number of the response :type page: int @@ -298300,7 +298301,7 @@ def index_vlc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vlc_get_serialize( + _param = self._index_virtuozzo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298332,7 +298333,7 @@ def index_vlc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", '404': "str", '500': "str", } @@ -298343,7 +298344,7 @@ def index_vlc_get_without_preload_content( return response_data.response - def _index_vlc_get_serialize( + def _index_virtuozzo_get_serialize( self, page, limit, @@ -298511,7 +298512,7 @@ def _index_vlc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vlc', + resource_path='/v3/index/virtuozzo', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -298528,7 +298529,7 @@ def _index_vlc_get_serialize( @validate_call - def index_vmware_get( + def index_vlc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298566,10 +298567,10 @@ def index_vmware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vmware\" + ) -> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination: + """Return vulnerability data stored in index \"vlc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` :param page: set the page number of the response :type page: int @@ -298641,7 +298642,7 @@ def index_vmware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vmware_get_serialize( + _param = self._index_vlc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298673,7 +298674,7 @@ def index_vmware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", '404': "str", '500': "str", } @@ -298689,7 +298690,7 @@ def index_vmware_get( @validate_call - def index_vmware_get_with_http_info( + def index_vlc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298727,10 +298728,10 @@ def index_vmware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vmware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination]: + """Return vulnerability data stored in index \"vlc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` :param page: set the page number of the response :type page: int @@ -298802,7 +298803,7 @@ def index_vmware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vmware_get_serialize( + _param = self._index_vlc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298834,7 +298835,7 @@ def index_vmware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", '404': "str", '500': "str", } @@ -298850,7 +298851,7 @@ def index_vmware_get_with_http_info( @validate_call - def index_vmware_get_without_preload_content( + def index_vlc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298889,9 +298890,9 @@ def index_vmware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vmware\" + """Return vulnerability data stored in index \"vlc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` :param page: set the page number of the response :type page: int @@ -298963,7 +298964,7 @@ def index_vmware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vmware_get_serialize( + _param = self._index_vlc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298995,7 +298996,7 @@ def index_vmware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", '404': "str", '500': "str", } @@ -299006,7 +299007,7 @@ def index_vmware_get_without_preload_content( return response_data.response - def _index_vmware_get_serialize( + def _index_vlc_get_serialize( self, page, limit, @@ -299174,7 +299175,7 @@ def _index_vmware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vmware', + resource_path='/v3/index/vlc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -299191,7 +299192,7 @@ def _index_vmware_get_serialize( @validate_call - def index_voidsec_get( + def index_vmware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299229,10 +299230,10 @@ def index_voidsec_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination: - """Return vulnerability data stored in index \"voidsec\" + ) -> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vmware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` :param page: set the page number of the response :type page: int @@ -299304,7 +299305,7 @@ def index_voidsec_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_voidsec_get_serialize( + _param = self._index_vmware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299336,7 +299337,7 @@ def index_voidsec_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -299352,7 +299353,7 @@ def index_voidsec_get( @validate_call - def index_voidsec_get_with_http_info( + def index_vmware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299390,10 +299391,10 @@ def index_voidsec_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination]: - """Return vulnerability data stored in index \"voidsec\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vmware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` :param page: set the page number of the response :type page: int @@ -299465,7 +299466,7 @@ def index_voidsec_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_voidsec_get_serialize( + _param = self._index_vmware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299497,7 +299498,7 @@ def index_voidsec_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -299513,7 +299514,7 @@ def index_voidsec_get_with_http_info( @validate_call - def index_voidsec_get_without_preload_content( + def index_vmware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299552,9 +299553,9 @@ def index_voidsec_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"voidsec\" + """Return vulnerability data stored in index \"vmware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` :param page: set the page number of the response :type page: int @@ -299626,7 +299627,7 @@ def index_voidsec_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_voidsec_get_serialize( + _param = self._index_vmware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299658,7 +299659,7 @@ def index_voidsec_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -299669,7 +299670,7 @@ def index_voidsec_get_without_preload_content( return response_data.response - def _index_voidsec_get_serialize( + def _index_vmware_get_serialize( self, page, limit, @@ -299837,7 +299838,7 @@ def _index_voidsec_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/voidsec', + resource_path='/v3/index/vmware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -299854,7 +299855,7 @@ def _index_voidsec_get_serialize( @validate_call - def index_vulncheck_canaries10d_get( + def index_voidsec_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299863,10 +299864,16 @@ def index_vulncheck_canaries10d_get( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -299886,10 +299893,10 @@ def index_vulncheck_canaries10d_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + ) -> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination: + """Return vulnerability data stored in index \"voidsec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` :param page: set the page number of the response :type page: int @@ -299905,14 +299912,26 @@ def index_vulncheck_canaries10d_get( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -299949,7 +299968,7 @@ def index_vulncheck_canaries10d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries10d_get_serialize( + _param = self._index_voidsec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299957,10 +299976,16 @@ def index_vulncheck_canaries10d_get( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -299975,7 +300000,7 @@ def index_vulncheck_canaries10d_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", '404': "str", '500': "str", } @@ -299991,7 +300016,7 @@ def index_vulncheck_canaries10d_get( @validate_call - def index_vulncheck_canaries10d_get_with_http_info( + def index_voidsec_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300000,10 +300025,16 @@ def index_vulncheck_canaries10d_get_with_http_info( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -300023,10 +300054,10 @@ def index_vulncheck_canaries10d_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination]: + """Return vulnerability data stored in index \"voidsec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` :param page: set the page number of the response :type page: int @@ -300042,14 +300073,26 @@ def index_vulncheck_canaries10d_get_with_http_info( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -300086,7 +300129,7 @@ def index_vulncheck_canaries10d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries10d_get_serialize( + _param = self._index_voidsec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300094,10 +300137,16 @@ def index_vulncheck_canaries10d_get_with_http_info( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -300112,7 +300161,7 @@ def index_vulncheck_canaries10d_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", '404': "str", '500': "str", } @@ -300128,7 +300177,7 @@ def index_vulncheck_canaries10d_get_with_http_info( @validate_call - def index_vulncheck_canaries10d_get_without_preload_content( + def index_voidsec_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300137,10 +300186,16 @@ def index_vulncheck_canaries10d_get_without_preload_content( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -300161,9 +300216,9 @@ def index_vulncheck_canaries10d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + """Return vulnerability data stored in index \"voidsec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` :param page: set the page number of the response :type page: int @@ -300179,14 +300234,26 @@ def index_vulncheck_canaries10d_get_without_preload_content( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -300223,7 +300290,7 @@ def index_vulncheck_canaries10d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries10d_get_serialize( + _param = self._index_voidsec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300231,10 +300298,16 @@ def index_vulncheck_canaries10d_get_without_preload_content( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -300249,7 +300322,7 @@ def index_vulncheck_canaries10d_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", '404': "str", '500': "str", } @@ -300260,7 +300333,7 @@ def index_vulncheck_canaries10d_get_without_preload_content( return response_data.response - def _index_vulncheck_canaries10d_get_serialize( + def _index_voidsec_get_serialize( self, page, limit, @@ -300269,10 +300342,16 @@ def _index_vulncheck_canaries10d_get_serialize( order, sort, cve, + alias, + iava, + jvndb, + ilvn, + threat_actor, + mitre_id, + misp_id, + ransomware, + botnet, published, - src_country, - dst_country, - src_ip, date, updated_at_start_date, updated_at_end_date, @@ -300333,21 +300412,45 @@ def _index_vulncheck_canaries10d_get_serialize( _query_params.append(('cve', cve)) - if published is not None: + if alias is not None: - _query_params.append(('published', published)) + _query_params.append(('alias', alias)) - if src_country is not None: + if iava is not None: - _query_params.append(('src_country', src_country)) + _query_params.append(('iava', iava)) - if dst_country is not None: + if jvndb is not None: - _query_params.append(('dst_country', dst_country)) + _query_params.append(('jvndb', jvndb)) - if src_ip is not None: + if ilvn is not None: - _query_params.append(('src_ip', src_ip)) + _query_params.append(('ilvn', ilvn)) + + if threat_actor is not None: + + _query_params.append(('threat_actor', threat_actor)) + + if mitre_id is not None: + + _query_params.append(('mitre_id', mitre_id)) + + if misp_id is not None: + + _query_params.append(('misp_id', misp_id)) + + if ransomware is not None: + + _query_params.append(('ransomware', ransomware)) + + if botnet is not None: + + _query_params.append(('botnet', botnet)) + + if published is not None: + + _query_params.append(('published', published)) if date is not None: @@ -300398,7 +300501,7 @@ def _index_vulncheck_canaries10d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-canaries-10d', + resource_path='/v3/index/voidsec', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -300415,7 +300518,7 @@ def _index_vulncheck_canaries10d_get_serialize( @validate_call - def index_vulncheck_canaries30d_get( + def index_vulncheck_canaries10d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300448,9 +300551,9 @@ def index_vulncheck_canaries30d_get( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + """Return vulnerability data stored in index \"vulncheck-canaries-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` :param page: set the page number of the response :type page: int @@ -300510,7 +300613,7 @@ def index_vulncheck_canaries30d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries30d_get_serialize( + _param = self._index_vulncheck_canaries10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300552,7 +300655,7 @@ def index_vulncheck_canaries30d_get( @validate_call - def index_vulncheck_canaries30d_get_with_http_info( + def index_vulncheck_canaries10d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300585,9 +300688,9 @@ def index_vulncheck_canaries30d_get_with_http_info( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + """Return vulnerability data stored in index \"vulncheck-canaries-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` :param page: set the page number of the response :type page: int @@ -300647,7 +300750,7 @@ def index_vulncheck_canaries30d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries30d_get_serialize( + _param = self._index_vulncheck_canaries10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300689,7 +300792,7 @@ def index_vulncheck_canaries30d_get_with_http_info( @validate_call - def index_vulncheck_canaries30d_get_without_preload_content( + def index_vulncheck_canaries10d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300722,9 +300825,9 @@ def index_vulncheck_canaries30d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + """Return vulnerability data stored in index \"vulncheck-canaries-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` :param page: set the page number of the response :type page: int @@ -300784,7 +300887,7 @@ def index_vulncheck_canaries30d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries30d_get_serialize( + _param = self._index_vulncheck_canaries10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300821,7 +300924,7 @@ def index_vulncheck_canaries30d_get_without_preload_content( return response_data.response - def _index_vulncheck_canaries30d_get_serialize( + def _index_vulncheck_canaries10d_get_serialize( self, page, limit, @@ -300959,7 +301062,7 @@ def _index_vulncheck_canaries30d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-canaries-30d', + resource_path='/v3/index/vulncheck-canaries-10d', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -300976,7 +301079,7 @@ def _index_vulncheck_canaries30d_get_serialize( @validate_call - def index_vulncheck_canaries3d_get( + def index_vulncheck_canaries30d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -301009,9 +301112,9 @@ def index_vulncheck_canaries3d_get( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + """Return vulnerability data stored in index \"vulncheck-canaries-30d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` :param page: set the page number of the response :type page: int @@ -301071,7 +301174,7 @@ def index_vulncheck_canaries3d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries3d_get_serialize( + _param = self._index_vulncheck_canaries30d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -301113,7 +301216,7 @@ def index_vulncheck_canaries3d_get( @validate_call - def index_vulncheck_canaries3d_get_with_http_info( + def index_vulncheck_canaries30d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -301146,9 +301249,9 @@ def index_vulncheck_canaries3d_get_with_http_info( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + """Return vulnerability data stored in index \"vulncheck-canaries-30d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` :param page: set the page number of the response :type page: int @@ -301208,7 +301311,7 @@ def index_vulncheck_canaries3d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries3d_get_serialize( + _param = self._index_vulncheck_canaries30d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -301250,7 +301353,568 @@ def index_vulncheck_canaries3d_get_with_http_info( @validate_call - def index_vulncheck_canaries3d_get_without_preload_content( + def index_vulncheck_canaries30d_get_without_preload_content( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries30d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _index_vulncheck_canaries30d_get_serialize( + self, + page, + limit, + cursor, + start_cursor, + order, + sort, + cve, + published, + src_country, + dst_country, + src_ip, + date, + updated_at_start_date, + updated_at_end_date, + last_mod_start_date, + last_mod_end_date, + pub_start_date, + pub_end_date, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if order is not None: + + _query_params.append(('order', order)) + + if sort is not None: + + _query_params.append(('sort', sort)) + + if cve is not None: + + _query_params.append(('cve', cve)) + + if published is not None: + + _query_params.append(('published', published)) + + if src_country is not None: + + _query_params.append(('src_country', src_country)) + + if dst_country is not None: + + _query_params.append(('dst_country', dst_country)) + + if src_ip is not None: + + _query_params.append(('src_ip', src_ip)) + + if date is not None: + + _query_params.append(('date', date)) + + if updated_at_start_date is not None: + + _query_params.append(('updatedAtStartDate', updated_at_start_date)) + + if updated_at_end_date is not None: + + _query_params.append(('updatedAtEndDate', updated_at_end_date)) + + if last_mod_start_date is not None: + + _query_params.append(('lastModStartDate', last_mod_start_date)) + + if last_mod_end_date is not None: + + _query_params.append(('lastModEndDate', last_mod_end_date)) + + if pub_start_date is not None: + + _query_params.append(('pubStartDate', pub_start_date)) + + if pub_end_date is not None: + + _query_params.append(('pubEndDate', pub_end_date)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/v3/index/vulncheck-canaries-30d', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + def index_vulncheck_canaries3d_get( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries3d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def index_vulncheck_canaries3d_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries3d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + def index_vulncheck_canaries3d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -302330,7 +302994,610 @@ def index_vulncheck_canaries_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries_get_serialize( + _param = self._index_vulncheck_canaries_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + def index_vulncheck_canaries_get_without_preload_content( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """Return vulnerability data stored in index \"vulncheck-canaries\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _index_vulncheck_canaries_get_serialize( + self, + page, + limit, + cursor, + start_cursor, + order, + sort, + cve, + published, + src_country, + dst_country, + src_ip, + date, + updated_at_start_date, + updated_at_end_date, + last_mod_start_date, + last_mod_end_date, + pub_start_date, + pub_end_date, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if order is not None: + + _query_params.append(('order', order)) + + if sort is not None: + + _query_params.append(('sort', sort)) + + if cve is not None: + + _query_params.append(('cve', cve)) + + if published is not None: + + _query_params.append(('published', published)) + + if src_country is not None: + + _query_params.append(('src_country', src_country)) + + if dst_country is not None: + + _query_params.append(('dst_country', dst_country)) + + if src_ip is not None: + + _query_params.append(('src_ip', src_ip)) + + if date is not None: + + _query_params.append(('date', date)) + + if updated_at_start_date is not None: + + _query_params.append(('updatedAtStartDate', updated_at_start_date)) + + if updated_at_end_date is not None: + + _query_params.append(('updatedAtEndDate', updated_at_end_date)) + + if last_mod_start_date is not None: + + _query_params.append(('lastModStartDate', last_mod_start_date)) + + if last_mod_end_date is not None: + + _query_params.append(('lastModEndDate', last_mod_end_date)) + + if pub_start_date is not None: + + _query_params.append(('pubStartDate', pub_start_date)) + + if pub_end_date is not None: + + _query_params.append(('pubEndDate', pub_end_date)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/v3/index/vulncheck-canaries', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + def index_vulncheck_config_get( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-config\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Configurations ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-config?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param published: Specify a published date + :type published: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_config_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + published=published, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def index_vulncheck_config_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-config\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Configurations ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-config?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param published: Specify a published date + :type published: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_config_get_serialize( page=page, limit=limit, cursor=cursor, @@ -302338,10 +303605,16 @@ def index_vulncheck_canaries_get_with_http_info( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -302356,7 +303629,7 @@ def index_vulncheck_canaries_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination", '404': "str", '500': "str", } @@ -302372,7 +303645,7 @@ def index_vulncheck_canaries_get_with_http_info( @validate_call - def index_vulncheck_canaries_get_without_preload_content( + def index_vulncheck_config_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -302381,10 +303654,16 @@ def index_vulncheck_canaries_get_without_preload_content( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -302405,9 +303684,9 @@ def index_vulncheck_canaries_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-canaries\" + """Return vulnerability data stored in index \"vulncheck-config\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Configurations ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-config?cursor=` :param page: set the page number of the response :type page: int @@ -302423,14 +303702,26 @@ def index_vulncheck_canaries_get_without_preload_content( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -302467,7 +303758,7 @@ def index_vulncheck_canaries_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries_get_serialize( + _param = self._index_vulncheck_config_get_serialize( page=page, limit=limit, cursor=cursor, @@ -302475,10 +303766,16 @@ def index_vulncheck_canaries_get_without_preload_content( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -302493,7 +303790,7 @@ def index_vulncheck_canaries_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination", '404': "str", '500': "str", } @@ -302504,7 +303801,7 @@ def index_vulncheck_canaries_get_without_preload_content( return response_data.response - def _index_vulncheck_canaries_get_serialize( + def _index_vulncheck_config_get_serialize( self, page, limit, @@ -302513,10 +303810,16 @@ def _index_vulncheck_canaries_get_serialize( order, sort, cve, + alias, + iava, + jvndb, + ilvn, + threat_actor, + mitre_id, + misp_id, + ransomware, + botnet, published, - src_country, - dst_country, - src_ip, date, updated_at_start_date, updated_at_end_date, @@ -302577,21 +303880,45 @@ def _index_vulncheck_canaries_get_serialize( _query_params.append(('cve', cve)) - if published is not None: + if alias is not None: - _query_params.append(('published', published)) + _query_params.append(('alias', alias)) - if src_country is not None: + if iava is not None: - _query_params.append(('src_country', src_country)) + _query_params.append(('iava', iava)) - if dst_country is not None: + if jvndb is not None: - _query_params.append(('dst_country', dst_country)) + _query_params.append(('jvndb', jvndb)) - if src_ip is not None: + if ilvn is not None: - _query_params.append(('src_ip', src_ip)) + _query_params.append(('ilvn', ilvn)) + + if threat_actor is not None: + + _query_params.append(('threat_actor', threat_actor)) + + if mitre_id is not None: + + _query_params.append(('mitre_id', mitre_id)) + + if misp_id is not None: + + _query_params.append(('misp_id', misp_id)) + + if ransomware is not None: + + _query_params.append(('ransomware', ransomware)) + + if botnet is not None: + + _query_params.append(('botnet', botnet)) + + if published is not None: + + _query_params.append(('published', published)) if date is not None: @@ -302642,7 +303969,7 @@ def _index_vulncheck_canaries_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-canaries', + resource_path='/v3/index/vulncheck-config', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -302659,7 +303986,7 @@ def _index_vulncheck_canaries_get_serialize( @validate_call - def index_vulncheck_config_get( + def index_vulncheck_cvelist_v5_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -302697,10 +304024,10 @@ def index_vulncheck_config_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-config\" + ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination: + """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Configurations ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-config?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -302772,7 +304099,7 @@ def index_vulncheck_config_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_config_get_serialize( + _param = self._index_vulncheck_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -302804,7 +304131,7 @@ def index_vulncheck_config_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -302820,7 +304147,7 @@ def index_vulncheck_config_get( @validate_call - def index_vulncheck_config_get_with_http_info( + def index_vulncheck_cvelist_v5_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -302858,10 +304185,10 @@ def index_vulncheck_config_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-config\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Configurations ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-config?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -302933,7 +304260,7 @@ def index_vulncheck_config_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_config_get_serialize( + _param = self._index_vulncheck_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -302965,7 +304292,7 @@ def index_vulncheck_config_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -302981,7 +304308,7 @@ def index_vulncheck_config_get_with_http_info( @validate_call - def index_vulncheck_config_get_without_preload_content( + def index_vulncheck_cvelist_v5_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -303020,9 +304347,9 @@ def index_vulncheck_config_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-config\" + """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Configurations ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-config?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -303094,7 +304421,7 @@ def index_vulncheck_config_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_config_get_serialize( + _param = self._index_vulncheck_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -303126,7 +304453,7 @@ def index_vulncheck_config_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -303137,7 +304464,7 @@ def index_vulncheck_config_get_without_preload_content( return response_data.response - def _index_vulncheck_config_get_serialize( + def _index_vulncheck_cvelist_v5_get_serialize( self, page, limit, @@ -303305,7 +304632,7 @@ def _index_vulncheck_config_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-config', + resource_path='/v3/index/vulncheck-cvelist-v5', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -303322,7 +304649,7 @@ def _index_vulncheck_config_get_serialize( @validate_call - def index_vulncheck_cvelist_v5_get( + def index_vulncheck_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -303360,10 +304687,10 @@ def index_vulncheck_cvelist_v5_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination: - """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" + ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination: + """Return vulnerability data stored in index \"vulncheck\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck?cursor=` :param page: set the page number of the response :type page: int @@ -303435,7 +304762,7 @@ def index_vulncheck_cvelist_v5_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_cvelist_v5_get_serialize( + _param = self._index_vulncheck_get_serialize( page=page, limit=limit, cursor=cursor, @@ -303467,7 +304794,7 @@ def index_vulncheck_cvelist_v5_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination", '404': "str", '500': "str", } @@ -303483,7 +304810,7 @@ def index_vulncheck_cvelist_v5_get( @validate_call - def index_vulncheck_cvelist_v5_get_with_http_info( + def index_vulncheck_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -303521,10 +304848,10 @@ def index_vulncheck_cvelist_v5_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck?cursor=` :param page: set the page number of the response :type page: int @@ -303596,7 +304923,7 @@ def index_vulncheck_cvelist_v5_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_cvelist_v5_get_serialize( + _param = self._index_vulncheck_get_serialize( page=page, limit=limit, cursor=cursor, @@ -303628,7 +304955,7 @@ def index_vulncheck_cvelist_v5_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination", '404': "str", '500': "str", } @@ -303644,7 +304971,7 @@ def index_vulncheck_cvelist_v5_get_with_http_info( @validate_call - def index_vulncheck_cvelist_v5_get_without_preload_content( + def index_vulncheck_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -303683,9 +305010,9 @@ def index_vulncheck_cvelist_v5_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" + """Return vulnerability data stored in index \"vulncheck\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck?cursor=` :param page: set the page number of the response :type page: int @@ -303757,7 +305084,7 @@ def index_vulncheck_cvelist_v5_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_cvelist_v5_get_serialize( + _param = self._index_vulncheck_get_serialize( page=page, limit=limit, cursor=cursor, @@ -303789,7 +305116,7 @@ def index_vulncheck_cvelist_v5_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination", '404': "str", '500': "str", } @@ -303800,7 +305127,7 @@ def index_vulncheck_cvelist_v5_get_without_preload_content( return response_data.response - def _index_vulncheck_cvelist_v5_get_serialize( + def _index_vulncheck_get_serialize( self, page, limit, @@ -303968,7 +305295,7 @@ def _index_vulncheck_cvelist_v5_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-cvelist-v5', + resource_path='/v3/index/vulncheck', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -303985,7 +305312,7 @@ def _index_vulncheck_cvelist_v5_get_serialize( @validate_call - def index_vulncheck_get( + def index_vulncheck_kev_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -304023,10 +305350,10 @@ def index_vulncheck_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination: - """Return vulnerability data stored in index \"vulncheck\" + ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-kev\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck KEV ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-kev?cursor=` :param page: set the page number of the response :type page: int @@ -304098,7 +305425,7 @@ def index_vulncheck_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_get_serialize( + _param = self._index_vulncheck_kev_get_serialize( page=page, limit=limit, cursor=cursor, @@ -304130,7 +305457,7 @@ def index_vulncheck_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination", '404': "str", '500': "str", } @@ -304146,7 +305473,7 @@ def index_vulncheck_get( @validate_call - def index_vulncheck_get_with_http_info( + def index_vulncheck_kev_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -304184,10 +305511,10 @@ def index_vulncheck_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-kev\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck KEV ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-kev?cursor=` :param page: set the page number of the response :type page: int @@ -304259,7 +305586,7 @@ def index_vulncheck_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_get_serialize( + _param = self._index_vulncheck_kev_get_serialize( page=page, limit=limit, cursor=cursor, @@ -304291,7 +305618,7 @@ def index_vulncheck_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination", '404': "str", '500': "str", } @@ -304307,7 +305634,7 @@ def index_vulncheck_get_with_http_info( @validate_call - def index_vulncheck_get_without_preload_content( + def index_vulncheck_kev_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -304346,9 +305673,9 @@ def index_vulncheck_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck\" + """Return vulnerability data stored in index \"vulncheck-kev\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck KEV ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-kev?cursor=` :param page: set the page number of the response :type page: int @@ -304420,7 +305747,7 @@ def index_vulncheck_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_get_serialize( + _param = self._index_vulncheck_kev_get_serialize( page=page, limit=limit, cursor=cursor, @@ -304452,7 +305779,7 @@ def index_vulncheck_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination", '404': "str", '500': "str", } @@ -304463,7 +305790,7 @@ def index_vulncheck_get_without_preload_content( return response_data.response - def _index_vulncheck_get_serialize( + def _index_vulncheck_kev_get_serialize( self, page, limit, @@ -304631,7 +305958,7 @@ def _index_vulncheck_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck', + resource_path='/v3/index/vulncheck-kev', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -304648,7 +305975,7 @@ def _index_vulncheck_get_serialize( @validate_call - def index_vulncheck_kev_get( + def index_vulncheck_nvd2_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -304686,10 +306013,10 @@ def index_vulncheck_kev_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-kev\" + ) -> RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck KEV ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-kev?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD V2 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -304761,7 +306088,7 @@ def index_vulncheck_kev_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_kev_get_serialize( + _param = self._index_vulncheck_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -304793,7 +306120,7 @@ def index_vulncheck_kev_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination", '404': "str", '500': "str", } @@ -304809,7 +306136,7 @@ def index_vulncheck_kev_get( @validate_call - def index_vulncheck_kev_get_with_http_info( + def index_vulncheck_nvd2_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -304847,10 +306174,10 @@ def index_vulncheck_kev_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-kev\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck KEV ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-kev?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD V2 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -304922,7 +306249,7 @@ def index_vulncheck_kev_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_kev_get_serialize( + _param = self._index_vulncheck_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -304954,7 +306281,7 @@ def index_vulncheck_kev_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination", '404': "str", '500': "str", } @@ -304970,7 +306297,7 @@ def index_vulncheck_kev_get_with_http_info( @validate_call - def index_vulncheck_kev_get_without_preload_content( + def index_vulncheck_nvd2_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -305009,9 +306336,9 @@ def index_vulncheck_kev_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-kev\" + """Return vulnerability data stored in index \"vulncheck-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck KEV ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-kev?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD V2 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -305083,7 +306410,7 @@ def index_vulncheck_kev_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_kev_get_serialize( + _param = self._index_vulncheck_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -305115,7 +306442,7 @@ def index_vulncheck_kev_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination", '404': "str", '500': "str", } @@ -305126,7 +306453,7 @@ def index_vulncheck_kev_get_without_preload_content( return response_data.response - def _index_vulncheck_kev_get_serialize( + def _index_vulncheck_nvd2_get_serialize( self, page, limit, @@ -305294,7 +306621,7 @@ def _index_vulncheck_kev_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-kev', + resource_path='/v3/index/vulncheck-nvd2', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -305311,7 +306638,7 @@ def _index_vulncheck_kev_get_serialize( @validate_call - def index_vulncheck_nvd2_get( + def index_vulncheck_nvd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -305349,10 +306676,10 @@ def index_vulncheck_nvd2_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-nvd2\" + ) -> RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD V2 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -305424,7 +306751,7 @@ def index_vulncheck_nvd2_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_nvd2_get_serialize( + _param = self._index_vulncheck_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -305456,7 +306783,7 @@ def index_vulncheck_nvd2_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination", '404': "str", '500': "str", } @@ -305472,7 +306799,7 @@ def index_vulncheck_nvd2_get( @validate_call - def index_vulncheck_nvd2_get_with_http_info( + def index_vulncheck_nvd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -305510,10 +306837,10 @@ def index_vulncheck_nvd2_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-nvd2\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD V2 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -305585,7 +306912,7 @@ def index_vulncheck_nvd2_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_nvd2_get_serialize( + _param = self._index_vulncheck_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -305617,7 +306944,7 @@ def index_vulncheck_nvd2_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination", '404': "str", '500': "str", } @@ -305633,7 +306960,7 @@ def index_vulncheck_nvd2_get_with_http_info( @validate_call - def index_vulncheck_nvd2_get_without_preload_content( + def index_vulncheck_nvd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -305672,9 +306999,9 @@ def index_vulncheck_nvd2_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-nvd2\" + """Return vulnerability data stored in index \"vulncheck-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD V2 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -305746,7 +307073,7 @@ def index_vulncheck_nvd2_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_nvd2_get_serialize( + _param = self._index_vulncheck_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -305778,7 +307105,7 @@ def index_vulncheck_nvd2_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination", '404': "str", '500': "str", } @@ -305789,7 +307116,7 @@ def index_vulncheck_nvd2_get_without_preload_content( return response_data.response - def _index_vulncheck_nvd2_get_serialize( + def _index_vulncheck_nvd_get_serialize( self, page, limit, @@ -305957,7 +307284,7 @@ def _index_vulncheck_nvd2_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-nvd2', + resource_path='/v3/index/vulncheck-nvd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -305974,7 +307301,7 @@ def _index_vulncheck_nvd2_get_serialize( @validate_call - def index_vulncheck_nvd_get( + def index_vulnerability_aliases_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -306012,10 +307339,10 @@ def index_vulncheck_nvd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-nvd\" + ) -> RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination: + """Return vulnerability data stored in index \"vulnerability-aliases\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vulnerability Aliases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnerability-aliases?cursor=` :param page: set the page number of the response :type page: int @@ -306087,7 +307414,7 @@ def index_vulncheck_nvd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_nvd_get_serialize( + _param = self._index_vulnerability_aliases_get_serialize( page=page, limit=limit, cursor=cursor, @@ -306119,7 +307446,7 @@ def index_vulncheck_nvd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination", '404': "str", '500': "str", } @@ -306135,7 +307462,7 @@ def index_vulncheck_nvd_get( @validate_call - def index_vulncheck_nvd_get_with_http_info( + def index_vulnerability_aliases_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -306173,10 +307500,10 @@ def index_vulncheck_nvd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-nvd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination]: + """Return vulnerability data stored in index \"vulnerability-aliases\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vulnerability Aliases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnerability-aliases?cursor=` :param page: set the page number of the response :type page: int @@ -306248,7 +307575,7 @@ def index_vulncheck_nvd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_nvd_get_serialize( + _param = self._index_vulnerability_aliases_get_serialize( page=page, limit=limit, cursor=cursor, @@ -306280,7 +307607,7 @@ def index_vulncheck_nvd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination", '404': "str", '500': "str", } @@ -306296,7 +307623,7 @@ def index_vulncheck_nvd_get_with_http_info( @validate_call - def index_vulncheck_nvd_get_without_preload_content( + def index_vulnerability_aliases_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -306335,9 +307662,9 @@ def index_vulncheck_nvd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-nvd\" + """Return vulnerability data stored in index \"vulnerability-aliases\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck NVD ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vulnerability Aliases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnerability-aliases?cursor=` :param page: set the page number of the response :type page: int @@ -306409,7 +307736,7 @@ def index_vulncheck_nvd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_nvd_get_serialize( + _param = self._index_vulnerability_aliases_get_serialize( page=page, limit=limit, cursor=cursor, @@ -306441,7 +307768,7 @@ def index_vulncheck_nvd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination", '404': "str", '500': "str", } @@ -306452,7 +307779,7 @@ def index_vulncheck_nvd_get_without_preload_content( return response_data.response - def _index_vulncheck_nvd_get_serialize( + def _index_vulnerability_aliases_get_serialize( self, page, limit, @@ -306620,7 +307947,7 @@ def _index_vulncheck_nvd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-nvd', + resource_path='/v3/index/vulnerability-aliases', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -306637,7 +307964,7 @@ def _index_vulncheck_nvd_get_serialize( @validate_call - def index_vulnerability_aliases_get( + def index_vulnrichment_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -306675,10 +308002,10 @@ def index_vulnerability_aliases_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination: - """Return vulnerability data stored in index \"vulnerability-aliases\" + ) -> RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination: + """Return vulnerability data stored in index \"vulnrichment\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vulnerability Aliases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnerability-aliases?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CISA Vulnrichment ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnrichment?cursor=` :param page: set the page number of the response :type page: int @@ -306750,7 +308077,7 @@ def index_vulnerability_aliases_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulnerability_aliases_get_serialize( + _param = self._index_vulnrichment_get_serialize( page=page, limit=limit, cursor=cursor, @@ -306782,7 +308109,7 @@ def index_vulnerability_aliases_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination", '404': "str", '500': "str", } @@ -306798,7 +308125,7 @@ def index_vulnerability_aliases_get( @validate_call - def index_vulnerability_aliases_get_with_http_info( + def index_vulnrichment_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -306836,10 +308163,10 @@ def index_vulnerability_aliases_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination]: - """Return vulnerability data stored in index \"vulnerability-aliases\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination]: + """Return vulnerability data stored in index \"vulnrichment\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vulnerability Aliases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnerability-aliases?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CISA Vulnrichment ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnrichment?cursor=` :param page: set the page number of the response :type page: int @@ -306911,7 +308238,7 @@ def index_vulnerability_aliases_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulnerability_aliases_get_serialize( + _param = self._index_vulnrichment_get_serialize( page=page, limit=limit, cursor=cursor, @@ -306943,7 +308270,7 @@ def index_vulnerability_aliases_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination", '404': "str", '500': "str", } @@ -306959,7 +308286,7 @@ def index_vulnerability_aliases_get_with_http_info( @validate_call - def index_vulnerability_aliases_get_without_preload_content( + def index_vulnrichment_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -306998,9 +308325,9 @@ def index_vulnerability_aliases_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulnerability-aliases\" + """Return vulnerability data stored in index \"vulnrichment\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vulnerability Aliases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnerability-aliases?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CISA Vulnrichment ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnrichment?cursor=` :param page: set the page number of the response :type page: int @@ -307072,7 +308399,7 @@ def index_vulnerability_aliases_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulnerability_aliases_get_serialize( + _param = self._index_vulnrichment_get_serialize( page=page, limit=limit, cursor=cursor, @@ -307104,7 +308431,7 @@ def index_vulnerability_aliases_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination", '404': "str", '500': "str", } @@ -307115,7 +308442,7 @@ def index_vulnerability_aliases_get_without_preload_content( return response_data.response - def _index_vulnerability_aliases_get_serialize( + def _index_vulnrichment_get_serialize( self, page, limit, @@ -307283,7 +308610,7 @@ def _index_vulnerability_aliases_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulnerability-aliases', + resource_path='/v3/index/vulnrichment', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -307300,7 +308627,7 @@ def _index_vulnerability_aliases_get_serialize( @validate_call - def index_vulnrichment_get( + def index_vyaire_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -307338,10 +308665,10 @@ def index_vulnrichment_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination: - """Return vulnerability data stored in index \"vulnrichment\" + ) -> RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vyaire\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CISA Vulnrichment ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnrichment?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vyaire Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vyaire?cursor=` :param page: set the page number of the response :type page: int @@ -307413,7 +308740,7 @@ def index_vulnrichment_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulnrichment_get_serialize( + _param = self._index_vyaire_get_serialize( page=page, limit=limit, cursor=cursor, @@ -307445,7 +308772,7 @@ def index_vulnrichment_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -307461,7 +308788,7 @@ def index_vulnrichment_get( @validate_call - def index_vulnrichment_get_with_http_info( + def index_vyaire_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -307499,10 +308826,10 @@ def index_vulnrichment_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination]: - """Return vulnerability data stored in index \"vulnrichment\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vyaire\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CISA Vulnrichment ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnrichment?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vyaire Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vyaire?cursor=` :param page: set the page number of the response :type page: int @@ -307574,7 +308901,7 @@ def index_vulnrichment_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulnrichment_get_serialize( + _param = self._index_vyaire_get_serialize( page=page, limit=limit, cursor=cursor, @@ -307606,7 +308933,7 @@ def index_vulnrichment_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -307622,7 +308949,7 @@ def index_vulnrichment_get_with_http_info( @validate_call - def index_vulnrichment_get_without_preload_content( + def index_vyaire_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -307661,9 +308988,9 @@ def index_vulnrichment_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulnrichment\" + """Return vulnerability data stored in index \"vyaire\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CISA Vulnrichment ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulnrichment?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vyaire Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vyaire?cursor=` :param page: set the page number of the response :type page: int @@ -307735,7 +309062,7 @@ def index_vulnrichment_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulnrichment_get_serialize( + _param = self._index_vyaire_get_serialize( page=page, limit=limit, cursor=cursor, @@ -307767,7 +309094,7 @@ def index_vulnrichment_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -307778,7 +309105,7 @@ def index_vulnrichment_get_without_preload_content( return response_data.response - def _index_vulnrichment_get_serialize( + def _index_vyaire_get_serialize( self, page, limit, @@ -307946,7 +309273,7 @@ def _index_vulnrichment_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulnrichment', + resource_path='/v3/index/vyaire', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -307963,7 +309290,7 @@ def _index_vulnrichment_get_serialize( @validate_call - def index_vyaire_get( + def index_watchguard_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -308001,10 +309328,10 @@ def index_vyaire_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vyaire\" + ) -> RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination: + """Return vulnerability data stored in index \"watchguard\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vyaire Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vyaire?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Watchguard Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/watchguard?cursor=` :param page: set the page number of the response :type page: int @@ -308076,7 +309403,7 @@ def index_vyaire_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vyaire_get_serialize( + _param = self._index_watchguard_get_serialize( page=page, limit=limit, cursor=cursor, @@ -308108,7 +309435,7 @@ def index_vyaire_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination", '404': "str", '500': "str", } @@ -308124,7 +309451,7 @@ def index_vyaire_get( @validate_call - def index_vyaire_get_with_http_info( + def index_watchguard_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -308162,10 +309489,10 @@ def index_vyaire_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vyaire\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination]: + """Return vulnerability data stored in index \"watchguard\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vyaire Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vyaire?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Watchguard Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/watchguard?cursor=` :param page: set the page number of the response :type page: int @@ -308237,7 +309564,7 @@ def index_vyaire_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vyaire_get_serialize( + _param = self._index_watchguard_get_serialize( page=page, limit=limit, cursor=cursor, @@ -308269,7 +309596,7 @@ def index_vyaire_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination", '404': "str", '500': "str", } @@ -308285,7 +309612,7 @@ def index_vyaire_get_with_http_info( @validate_call - def index_vyaire_get_without_preload_content( + def index_watchguard_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -308324,9 +309651,9 @@ def index_vyaire_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vyaire\" + """Return vulnerability data stored in index \"watchguard\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Vyaire Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vyaire?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Watchguard Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/watchguard?cursor=` :param page: set the page number of the response :type page: int @@ -308398,7 +309725,7 @@ def index_vyaire_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vyaire_get_serialize( + _param = self._index_watchguard_get_serialize( page=page, limit=limit, cursor=cursor, @@ -308430,7 +309757,7 @@ def index_vyaire_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination", '404': "str", '500': "str", } @@ -308441,7 +309768,7 @@ def index_vyaire_get_without_preload_content( return response_data.response - def _index_vyaire_get_serialize( + def _index_watchguard_get_serialize( self, page, limit, @@ -308609,7 +309936,7 @@ def _index_vyaire_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vyaire', + resource_path='/v3/index/watchguard', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -308626,7 +309953,7 @@ def _index_vyaire_get_serialize( @validate_call - def index_watchguard_get( + def index_whatsapp_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -308664,10 +309991,10 @@ def index_watchguard_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination: - """Return vulnerability data stored in index \"watchguard\" + ) -> RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination: + """Return vulnerability data stored in index \"whatsapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Watchguard Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/watchguard?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WhatsApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/whatsapp?cursor=` :param page: set the page number of the response :type page: int @@ -308739,7 +310066,7 @@ def index_watchguard_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_watchguard_get_serialize( + _param = self._index_whatsapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -308771,7 +310098,7 @@ def index_watchguard_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination", '404': "str", '500': "str", } @@ -308787,7 +310114,7 @@ def index_watchguard_get( @validate_call - def index_watchguard_get_with_http_info( + def index_whatsapp_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -308825,10 +310152,10 @@ def index_watchguard_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination]: - """Return vulnerability data stored in index \"watchguard\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination]: + """Return vulnerability data stored in index \"whatsapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Watchguard Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/watchguard?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WhatsApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/whatsapp?cursor=` :param page: set the page number of the response :type page: int @@ -308900,7 +310227,7 @@ def index_watchguard_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_watchguard_get_serialize( + _param = self._index_whatsapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -308932,7 +310259,7 @@ def index_watchguard_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination", '404': "str", '500': "str", } @@ -308948,7 +310275,7 @@ def index_watchguard_get_with_http_info( @validate_call - def index_watchguard_get_without_preload_content( + def index_whatsapp_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -308987,9 +310314,9 @@ def index_watchguard_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"watchguard\" + """Return vulnerability data stored in index \"whatsapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Watchguard Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/watchguard?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WhatsApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/whatsapp?cursor=` :param page: set the page number of the response :type page: int @@ -309061,7 +310388,7 @@ def index_watchguard_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_watchguard_get_serialize( + _param = self._index_whatsapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -309093,7 +310420,7 @@ def index_watchguard_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination", '404': "str", '500': "str", } @@ -309104,7 +310431,7 @@ def index_watchguard_get_without_preload_content( return response_data.response - def _index_watchguard_get_serialize( + def _index_whatsapp_get_serialize( self, page, limit, @@ -309272,7 +310599,7 @@ def _index_watchguard_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/watchguard', + resource_path='/v3/index/whatsapp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -309289,7 +310616,7 @@ def _index_watchguard_get_serialize( @validate_call - def index_whatsapp_get( + def index_wibu_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -309327,10 +310654,10 @@ def index_whatsapp_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination: - """Return vulnerability data stored in index \"whatsapp\" + ) -> RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination: + """Return vulnerability data stored in index \"wibu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WhatsApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/whatsapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wibu Systems Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wibu?cursor=` :param page: set the page number of the response :type page: int @@ -309402,7 +310729,7 @@ def index_whatsapp_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_whatsapp_get_serialize( + _param = self._index_wibu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -309434,7 +310761,7 @@ def index_whatsapp_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination", '404': "str", '500': "str", } @@ -309450,7 +310777,7 @@ def index_whatsapp_get( @validate_call - def index_whatsapp_get_with_http_info( + def index_wibu_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -309488,10 +310815,10 @@ def index_whatsapp_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination]: - """Return vulnerability data stored in index \"whatsapp\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination]: + """Return vulnerability data stored in index \"wibu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WhatsApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/whatsapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wibu Systems Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wibu?cursor=` :param page: set the page number of the response :type page: int @@ -309563,7 +310890,7 @@ def index_whatsapp_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_whatsapp_get_serialize( + _param = self._index_wibu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -309595,7 +310922,7 @@ def index_whatsapp_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination", '404': "str", '500': "str", } @@ -309611,7 +310938,7 @@ def index_whatsapp_get_with_http_info( @validate_call - def index_whatsapp_get_without_preload_content( + def index_wibu_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -309650,9 +310977,9 @@ def index_whatsapp_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"whatsapp\" + """Return vulnerability data stored in index \"wibu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WhatsApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/whatsapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wibu Systems Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wibu?cursor=` :param page: set the page number of the response :type page: int @@ -309724,7 +311051,7 @@ def index_whatsapp_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_whatsapp_get_serialize( + _param = self._index_wibu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -309756,7 +311083,7 @@ def index_whatsapp_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination", '404': "str", '500': "str", } @@ -309767,7 +311094,7 @@ def index_whatsapp_get_without_preload_content( return response_data.response - def _index_whatsapp_get_serialize( + def _index_wibu_get_serialize( self, page, limit, @@ -309935,7 +311262,7 @@ def _index_whatsapp_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/whatsapp', + resource_path='/v3/index/wibu', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -309952,7 +311279,7 @@ def _index_whatsapp_get_serialize( @validate_call - def index_wibu_get( + def index_wireshark_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -309990,10 +311317,10 @@ def index_wibu_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination: - """Return vulnerability data stored in index \"wibu\" + ) -> RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination: + """Return vulnerability data stored in index \"wireshark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wibu Systems Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wibu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wireshark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wireshark?cursor=` :param page: set the page number of the response :type page: int @@ -310065,7 +311392,7 @@ def index_wibu_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wibu_get_serialize( + _param = self._index_wireshark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -310097,7 +311424,7 @@ def index_wibu_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination", '404': "str", '500': "str", } @@ -310113,7 +311440,7 @@ def index_wibu_get( @validate_call - def index_wibu_get_with_http_info( + def index_wireshark_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -310151,10 +311478,10 @@ def index_wibu_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination]: - """Return vulnerability data stored in index \"wibu\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination]: + """Return vulnerability data stored in index \"wireshark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wibu Systems Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wibu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wireshark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wireshark?cursor=` :param page: set the page number of the response :type page: int @@ -310226,7 +311553,7 @@ def index_wibu_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wibu_get_serialize( + _param = self._index_wireshark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -310258,7 +311585,7 @@ def index_wibu_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination", '404': "str", '500': "str", } @@ -310274,7 +311601,7 @@ def index_wibu_get_with_http_info( @validate_call - def index_wibu_get_without_preload_content( + def index_wireshark_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -310313,9 +311640,9 @@ def index_wibu_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"wibu\" + """Return vulnerability data stored in index \"wireshark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wibu Systems Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wibu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wireshark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wireshark?cursor=` :param page: set the page number of the response :type page: int @@ -310387,7 +311714,7 @@ def index_wibu_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wibu_get_serialize( + _param = self._index_wireshark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -310419,7 +311746,7 @@ def index_wibu_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination", '404': "str", '500': "str", } @@ -310430,7 +311757,7 @@ def index_wibu_get_without_preload_content( return response_data.response - def _index_wibu_get_serialize( + def _index_wireshark_get_serialize( self, page, limit, @@ -310598,7 +311925,7 @@ def _index_wibu_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/wibu', + resource_path='/v3/index/wireshark', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -310615,7 +311942,7 @@ def _index_wibu_get_serialize( @validate_call - def index_wireshark_get( + def index_with_secure_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -310653,10 +311980,10 @@ def index_wireshark_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination: - """Return vulnerability data stored in index \"wireshark\" + ) -> RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination: + """Return vulnerability data stored in index \"with-secure\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wireshark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wireshark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** With Secure Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/with-secure?cursor=` :param page: set the page number of the response :type page: int @@ -310728,7 +312055,7 @@ def index_wireshark_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wireshark_get_serialize( + _param = self._index_with_secure_get_serialize( page=page, limit=limit, cursor=cursor, @@ -310760,7 +312087,7 @@ def index_wireshark_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination", '404': "str", '500': "str", } @@ -310776,7 +312103,7 @@ def index_wireshark_get( @validate_call - def index_wireshark_get_with_http_info( + def index_with_secure_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -310814,10 +312141,10 @@ def index_wireshark_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination]: - """Return vulnerability data stored in index \"wireshark\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination]: + """Return vulnerability data stored in index \"with-secure\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wireshark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wireshark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** With Secure Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/with-secure?cursor=` :param page: set the page number of the response :type page: int @@ -310889,7 +312216,7 @@ def index_wireshark_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wireshark_get_serialize( + _param = self._index_with_secure_get_serialize( page=page, limit=limit, cursor=cursor, @@ -310921,7 +312248,7 @@ def index_wireshark_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination", '404': "str", '500': "str", } @@ -310937,7 +312264,7 @@ def index_wireshark_get_with_http_info( @validate_call - def index_wireshark_get_without_preload_content( + def index_with_secure_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -310976,9 +312303,9 @@ def index_wireshark_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"wireshark\" + """Return vulnerability data stored in index \"with-secure\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wireshark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wireshark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** With Secure Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/with-secure?cursor=` :param page: set the page number of the response :type page: int @@ -311050,7 +312377,7 @@ def index_wireshark_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wireshark_get_serialize( + _param = self._index_with_secure_get_serialize( page=page, limit=limit, cursor=cursor, @@ -311082,7 +312409,7 @@ def index_wireshark_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination", '404': "str", '500': "str", } @@ -311093,7 +312420,7 @@ def index_wireshark_get_without_preload_content( return response_data.response - def _index_wireshark_get_serialize( + def _index_with_secure_get_serialize( self, page, limit, @@ -311261,7 +312588,7 @@ def _index_wireshark_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/wireshark', + resource_path='/v3/index/with-secure', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -311278,7 +312605,7 @@ def _index_wireshark_get_serialize( @validate_call - def index_with_secure_get( + def index_wolfi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -311316,10 +312643,10 @@ def index_with_secure_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination: - """Return vulnerability data stored in index \"with-secure\" + ) -> RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination: + """Return vulnerability data stored in index \"wolfi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** With Secure Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/with-secure?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wolfi Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfi?cursor=` :param page: set the page number of the response :type page: int @@ -311391,7 +312718,7 @@ def index_with_secure_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_with_secure_get_serialize( + _param = self._index_wolfi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -311423,7 +312750,7 @@ def index_with_secure_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination", '404': "str", '500': "str", } @@ -311439,7 +312766,7 @@ def index_with_secure_get( @validate_call - def index_with_secure_get_with_http_info( + def index_wolfi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -311477,10 +312804,10 @@ def index_with_secure_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination]: - """Return vulnerability data stored in index \"with-secure\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination]: + """Return vulnerability data stored in index \"wolfi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** With Secure Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/with-secure?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wolfi Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfi?cursor=` :param page: set the page number of the response :type page: int @@ -311552,7 +312879,7 @@ def index_with_secure_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_with_secure_get_serialize( + _param = self._index_wolfi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -311584,7 +312911,7 @@ def index_with_secure_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination", '404': "str", '500': "str", } @@ -311600,7 +312927,7 @@ def index_with_secure_get_with_http_info( @validate_call - def index_with_secure_get_without_preload_content( + def index_wolfi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -311639,9 +312966,9 @@ def index_with_secure_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"with-secure\" + """Return vulnerability data stored in index \"wolfi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** With Secure Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/with-secure?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wolfi Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfi?cursor=` :param page: set the page number of the response :type page: int @@ -311713,7 +313040,7 @@ def index_with_secure_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_with_secure_get_serialize( + _param = self._index_wolfi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -311745,7 +313072,7 @@ def index_with_secure_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination", '404': "str", '500': "str", } @@ -311756,7 +313083,7 @@ def index_with_secure_get_without_preload_content( return response_data.response - def _index_with_secure_get_serialize( + def _index_wolfi_get_serialize( self, page, limit, @@ -311924,7 +313251,7 @@ def _index_with_secure_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/with-secure', + resource_path='/v3/index/wolfi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -311941,7 +313268,7 @@ def _index_with_secure_get_serialize( @validate_call - def index_wolfi_get( + def index_wolfssl_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -311979,10 +313306,10 @@ def index_wolfi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination: - """Return vulnerability data stored in index \"wolfi\" + ) -> RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination: + """Return vulnerability data stored in index \"wolfssl\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wolfi Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WolfSSL Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfssl?cursor=` :param page: set the page number of the response :type page: int @@ -312054,7 +313381,7 @@ def index_wolfi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wolfi_get_serialize( + _param = self._index_wolfssl_get_serialize( page=page, limit=limit, cursor=cursor, @@ -312086,7 +313413,7 @@ def index_wolfi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination", '404': "str", '500': "str", } @@ -312102,7 +313429,7 @@ def index_wolfi_get( @validate_call - def index_wolfi_get_with_http_info( + def index_wolfssl_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -312140,10 +313467,10 @@ def index_wolfi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination]: - """Return vulnerability data stored in index \"wolfi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination]: + """Return vulnerability data stored in index \"wolfssl\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wolfi Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WolfSSL Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfssl?cursor=` :param page: set the page number of the response :type page: int @@ -312215,7 +313542,7 @@ def index_wolfi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wolfi_get_serialize( + _param = self._index_wolfssl_get_serialize( page=page, limit=limit, cursor=cursor, @@ -312247,7 +313574,7 @@ def index_wolfi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination", '404': "str", '500': "str", } @@ -312263,7 +313590,7 @@ def index_wolfi_get_with_http_info( @validate_call - def index_wolfi_get_without_preload_content( + def index_wolfssl_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -312302,9 +313629,9 @@ def index_wolfi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"wolfi\" + """Return vulnerability data stored in index \"wolfssl\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wolfi Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WolfSSL Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfssl?cursor=` :param page: set the page number of the response :type page: int @@ -312376,7 +313703,7 @@ def index_wolfi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wolfi_get_serialize( + _param = self._index_wolfssl_get_serialize( page=page, limit=limit, cursor=cursor, @@ -312408,7 +313735,7 @@ def index_wolfi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination", '404': "str", '500': "str", } @@ -312419,7 +313746,7 @@ def index_wolfi_get_without_preload_content( return response_data.response - def _index_wolfi_get_serialize( + def _index_wolfssl_get_serialize( self, page, limit, @@ -312587,7 +313914,7 @@ def _index_wolfi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/wolfi', + resource_path='/v3/index/wolfssl', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -312604,7 +313931,7 @@ def _index_wolfi_get_serialize( @validate_call - def index_wolfssl_get( + def index_wordfence_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -312642,10 +313969,10 @@ def index_wolfssl_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination: - """Return vulnerability data stored in index \"wolfssl\" + ) -> RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination: + """Return vulnerability data stored in index \"wordfence\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WolfSSL Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfssl?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wordfence Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wordfence?cursor=` :param page: set the page number of the response :type page: int @@ -312717,7 +314044,7 @@ def index_wolfssl_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wolfssl_get_serialize( + _param = self._index_wordfence_get_serialize( page=page, limit=limit, cursor=cursor, @@ -312749,7 +314076,7 @@ def index_wolfssl_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination", '404': "str", '500': "str", } @@ -312765,7 +314092,7 @@ def index_wolfssl_get( @validate_call - def index_wolfssl_get_with_http_info( + def index_wordfence_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -312803,10 +314130,10 @@ def index_wolfssl_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination]: - """Return vulnerability data stored in index \"wolfssl\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination]: + """Return vulnerability data stored in index \"wordfence\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WolfSSL Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfssl?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wordfence Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wordfence?cursor=` :param page: set the page number of the response :type page: int @@ -312878,7 +314205,7 @@ def index_wolfssl_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wolfssl_get_serialize( + _param = self._index_wordfence_get_serialize( page=page, limit=limit, cursor=cursor, @@ -312910,7 +314237,7 @@ def index_wolfssl_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination", '404': "str", '500': "str", } @@ -312926,7 +314253,7 @@ def index_wolfssl_get_with_http_info( @validate_call - def index_wolfssl_get_without_preload_content( + def index_wordfence_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -312965,9 +314292,9 @@ def index_wolfssl_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"wolfssl\" + """Return vulnerability data stored in index \"wordfence\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** WolfSSL Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wolfssl?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wordfence Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wordfence?cursor=` :param page: set the page number of the response :type page: int @@ -313039,7 +314366,7 @@ def index_wolfssl_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wolfssl_get_serialize( + _param = self._index_wordfence_get_serialize( page=page, limit=limit, cursor=cursor, @@ -313071,7 +314398,7 @@ def index_wolfssl_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination", '404': "str", '500': "str", } @@ -313082,7 +314409,7 @@ def index_wolfssl_get_without_preload_content( return response_data.response - def _index_wolfssl_get_serialize( + def _index_wordfence_get_serialize( self, page, limit, @@ -313250,7 +314577,7 @@ def _index_wolfssl_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/wolfssl', + resource_path='/v3/index/wordfence', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -313267,7 +314594,7 @@ def _index_wolfssl_get_serialize( @validate_call - def index_wordfence_get( + def index_xen_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -313305,10 +314632,10 @@ def index_wordfence_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination: - """Return vulnerability data stored in index \"wordfence\" + ) -> RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination: + """Return vulnerability data stored in index \"xen\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wordfence Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wordfence?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xen index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xen Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xen?cursor=` :param page: set the page number of the response :type page: int @@ -313380,7 +314707,7 @@ def index_wordfence_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wordfence_get_serialize( + _param = self._index_xen_get_serialize( page=page, limit=limit, cursor=cursor, @@ -313412,7 +314739,7 @@ def index_wordfence_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination", '404': "str", '500': "str", } @@ -313428,7 +314755,7 @@ def index_wordfence_get( @validate_call - def index_wordfence_get_with_http_info( + def index_xen_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -313466,10 +314793,10 @@ def index_wordfence_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination]: - """Return vulnerability data stored in index \"wordfence\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination]: + """Return vulnerability data stored in index \"xen\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wordfence Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wordfence?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xen index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xen Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xen?cursor=` :param page: set the page number of the response :type page: int @@ -313541,7 +314868,7 @@ def index_wordfence_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wordfence_get_serialize( + _param = self._index_xen_get_serialize( page=page, limit=limit, cursor=cursor, @@ -313573,7 +314900,7 @@ def index_wordfence_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination", '404': "str", '500': "str", } @@ -313589,7 +314916,7 @@ def index_wordfence_get_with_http_info( @validate_call - def index_wordfence_get_without_preload_content( + def index_xen_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -313628,9 +314955,9 @@ def index_wordfence_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"wordfence\" + """Return vulnerability data stored in index \"xen\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Wordfence Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/wordfence?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xen index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xen Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xen?cursor=` :param page: set the page number of the response :type page: int @@ -313702,7 +315029,7 @@ def index_wordfence_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_wordfence_get_serialize( + _param = self._index_xen_get_serialize( page=page, limit=limit, cursor=cursor, @@ -313734,7 +315061,7 @@ def index_wordfence_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination", '404': "str", '500': "str", } @@ -313745,7 +315072,7 @@ def index_wordfence_get_without_preload_content( return response_data.response - def _index_wordfence_get_serialize( + def _index_xen_get_serialize( self, page, limit, @@ -313913,7 +315240,7 @@ def _index_wordfence_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/wordfence', + resource_path='/v3/index/xen', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -313930,7 +315257,7 @@ def _index_wordfence_get_serialize( @validate_call - def index_xen_get( + def index_xerox_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -313968,10 +315295,10 @@ def index_xen_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination: - """Return vulnerability data stored in index \"xen\" + ) -> RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination: + """Return vulnerability data stored in index \"xerox\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xen index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xen Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xen?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xerox Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xerox?cursor=` :param page: set the page number of the response :type page: int @@ -314043,7 +315370,7 @@ def index_xen_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xen_get_serialize( + _param = self._index_xerox_get_serialize( page=page, limit=limit, cursor=cursor, @@ -314075,7 +315402,7 @@ def index_xen_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination", '404': "str", '500': "str", } @@ -314091,7 +315418,7 @@ def index_xen_get( @validate_call - def index_xen_get_with_http_info( + def index_xerox_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -314129,10 +315456,10 @@ def index_xen_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination]: - """Return vulnerability data stored in index \"xen\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination]: + """Return vulnerability data stored in index \"xerox\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xen index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xen Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xen?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xerox Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xerox?cursor=` :param page: set the page number of the response :type page: int @@ -314204,7 +315531,7 @@ def index_xen_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xen_get_serialize( + _param = self._index_xerox_get_serialize( page=page, limit=limit, cursor=cursor, @@ -314236,7 +315563,7 @@ def index_xen_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination", '404': "str", '500': "str", } @@ -314252,7 +315579,7 @@ def index_xen_get_with_http_info( @validate_call - def index_xen_get_without_preload_content( + def index_xerox_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -314291,9 +315618,9 @@ def index_xen_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"xen\" + """Return vulnerability data stored in index \"xerox\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xen index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xen Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xen?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xerox Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xerox?cursor=` :param page: set the page number of the response :type page: int @@ -314365,7 +315692,7 @@ def index_xen_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xen_get_serialize( + _param = self._index_xerox_get_serialize( page=page, limit=limit, cursor=cursor, @@ -314397,7 +315724,7 @@ def index_xen_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination", '404': "str", '500': "str", } @@ -314408,7 +315735,7 @@ def index_xen_get_without_preload_content( return response_data.response - def _index_xen_get_serialize( + def _index_xerox_get_serialize( self, page, limit, @@ -314576,7 +315903,7 @@ def _index_xen_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/xen', + resource_path='/v3/index/xerox', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -314593,7 +315920,7 @@ def _index_xen_get_serialize( @validate_call - def index_xerox_get( + def index_xiaomi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -314631,10 +315958,10 @@ def index_xerox_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination: - """Return vulnerability data stored in index \"xerox\" + ) -> RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination: + """Return vulnerability data stored in index \"xiaomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xerox Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xerox?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xiaomi Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xiaomi?cursor=` :param page: set the page number of the response :type page: int @@ -314706,7 +316033,7 @@ def index_xerox_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xerox_get_serialize( + _param = self._index_xiaomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -314738,7 +316065,7 @@ def index_xerox_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination", '404': "str", '500': "str", } @@ -314754,7 +316081,7 @@ def index_xerox_get( @validate_call - def index_xerox_get_with_http_info( + def index_xiaomi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -314792,10 +316119,10 @@ def index_xerox_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination]: - """Return vulnerability data stored in index \"xerox\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination]: + """Return vulnerability data stored in index \"xiaomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xerox Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xerox?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xiaomi Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xiaomi?cursor=` :param page: set the page number of the response :type page: int @@ -314867,7 +316194,7 @@ def index_xerox_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xerox_get_serialize( + _param = self._index_xiaomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -314899,7 +316226,7 @@ def index_xerox_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination", '404': "str", '500': "str", } @@ -314915,7 +316242,7 @@ def index_xerox_get_with_http_info( @validate_call - def index_xerox_get_without_preload_content( + def index_xiaomi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -314954,9 +316281,9 @@ def index_xerox_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"xerox\" + """Return vulnerability data stored in index \"xiaomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xerox Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xerox?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xiaomi Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xiaomi?cursor=` :param page: set the page number of the response :type page: int @@ -315028,7 +316355,7 @@ def index_xerox_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xerox_get_serialize( + _param = self._index_xiaomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -315060,7 +316387,7 @@ def index_xerox_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination", '404': "str", '500': "str", } @@ -315071,7 +316398,7 @@ def index_xerox_get_without_preload_content( return response_data.response - def _index_xerox_get_serialize( + def _index_xiaomi_get_serialize( self, page, limit, @@ -315239,7 +316566,7 @@ def _index_xerox_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/xerox', + resource_path='/v3/index/xiaomi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -315256,7 +316583,7 @@ def _index_xerox_get_serialize( @validate_call - def index_xiaomi_get( + def index_xylem_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -315294,10 +316621,10 @@ def index_xiaomi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination: - """Return vulnerability data stored in index \"xiaomi\" + ) -> RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination: + """Return vulnerability data stored in index \"xylem\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xiaomi Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xiaomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xylem Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xylem?cursor=` :param page: set the page number of the response :type page: int @@ -315369,7 +316696,7 @@ def index_xiaomi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xiaomi_get_serialize( + _param = self._index_xylem_get_serialize( page=page, limit=limit, cursor=cursor, @@ -315401,7 +316728,7 @@ def index_xiaomi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination", '404': "str", '500': "str", } @@ -315417,7 +316744,7 @@ def index_xiaomi_get( @validate_call - def index_xiaomi_get_with_http_info( + def index_xylem_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -315455,10 +316782,10 @@ def index_xiaomi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination]: - """Return vulnerability data stored in index \"xiaomi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination]: + """Return vulnerability data stored in index \"xylem\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xiaomi Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xiaomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xylem Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xylem?cursor=` :param page: set the page number of the response :type page: int @@ -315530,7 +316857,7 @@ def index_xiaomi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xiaomi_get_serialize( + _param = self._index_xylem_get_serialize( page=page, limit=limit, cursor=cursor, @@ -315562,7 +316889,7 @@ def index_xiaomi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination", '404': "str", '500': "str", } @@ -315578,7 +316905,7 @@ def index_xiaomi_get_with_http_info( @validate_call - def index_xiaomi_get_without_preload_content( + def index_xylem_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -315617,9 +316944,9 @@ def index_xiaomi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"xiaomi\" + """Return vulnerability data stored in index \"xylem\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xiaomi Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xiaomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xylem Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xylem?cursor=` :param page: set the page number of the response :type page: int @@ -315691,7 +317018,7 @@ def index_xiaomi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xiaomi_get_serialize( + _param = self._index_xylem_get_serialize( page=page, limit=limit, cursor=cursor, @@ -315723,7 +317050,7 @@ def index_xiaomi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination", '404': "str", '500': "str", } @@ -315734,7 +317061,7 @@ def index_xiaomi_get_without_preload_content( return response_data.response - def _index_xiaomi_get_serialize( + def _index_xylem_get_serialize( self, page, limit, @@ -315902,7 +317229,7 @@ def _index_xiaomi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/xiaomi', + resource_path='/v3/index/xylem', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -315919,7 +317246,7 @@ def _index_xiaomi_get_serialize( @validate_call - def index_xylem_get( + def index_yamaha_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -315957,10 +317284,10 @@ def index_xylem_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination: - """Return vulnerability data stored in index \"xylem\" + ) -> RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination: + """Return vulnerability data stored in index \"yamaha\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xylem Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xylem?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yamaha Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yamaha?cursor=` :param page: set the page number of the response :type page: int @@ -316032,7 +317359,7 @@ def index_xylem_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xylem_get_serialize( + _param = self._index_yamaha_get_serialize( page=page, limit=limit, cursor=cursor, @@ -316064,7 +317391,7 @@ def index_xylem_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination", '404': "str", '500': "str", } @@ -316080,7 +317407,7 @@ def index_xylem_get( @validate_call - def index_xylem_get_with_http_info( + def index_yamaha_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -316118,10 +317445,10 @@ def index_xylem_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination]: - """Return vulnerability data stored in index \"xylem\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination]: + """Return vulnerability data stored in index \"yamaha\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xylem Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xylem?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yamaha Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yamaha?cursor=` :param page: set the page number of the response :type page: int @@ -316193,7 +317520,7 @@ def index_xylem_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xylem_get_serialize( + _param = self._index_yamaha_get_serialize( page=page, limit=limit, cursor=cursor, @@ -316225,7 +317552,7 @@ def index_xylem_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination", '404': "str", '500': "str", } @@ -316241,7 +317568,7 @@ def index_xylem_get_with_http_info( @validate_call - def index_xylem_get_without_preload_content( + def index_yamaha_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -316280,9 +317607,9 @@ def index_xylem_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"xylem\" + """Return vulnerability data stored in index \"yamaha\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Xylem Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/xylem?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yamaha Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yamaha?cursor=` :param page: set the page number of the response :type page: int @@ -316354,7 +317681,7 @@ def index_xylem_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_xylem_get_serialize( + _param = self._index_yamaha_get_serialize( page=page, limit=limit, cursor=cursor, @@ -316386,7 +317713,7 @@ def index_xylem_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination", '404': "str", '500': "str", } @@ -316397,7 +317724,7 @@ def index_xylem_get_without_preload_content( return response_data.response - def _index_xylem_get_serialize( + def _index_yamaha_get_serialize( self, page, limit, @@ -316565,7 +317892,7 @@ def _index_xylem_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/xylem', + resource_path='/v3/index/yamaha', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -316582,7 +317909,7 @@ def _index_xylem_get_serialize( @validate_call - def index_yamaha_get( + def index_yokogawa_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -316620,10 +317947,10 @@ def index_yamaha_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination: - """Return vulnerability data stored in index \"yamaha\" + ) -> RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"yokogawa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yamaha Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yamaha?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yokogawa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yokogawa?cursor=` :param page: set the page number of the response :type page: int @@ -316695,7 +318022,7 @@ def index_yamaha_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yamaha_get_serialize( + _param = self._index_yokogawa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -316727,7 +318054,7 @@ def index_yamaha_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -316743,7 +318070,7 @@ def index_yamaha_get( @validate_call - def index_yamaha_get_with_http_info( + def index_yokogawa_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -316781,10 +318108,10 @@ def index_yamaha_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination]: - """Return vulnerability data stored in index \"yamaha\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"yokogawa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yamaha Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yamaha?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yokogawa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yokogawa?cursor=` :param page: set the page number of the response :type page: int @@ -316856,7 +318183,7 @@ def index_yamaha_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yamaha_get_serialize( + _param = self._index_yokogawa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -316888,7 +318215,7 @@ def index_yamaha_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -316904,7 +318231,7 @@ def index_yamaha_get_with_http_info( @validate_call - def index_yamaha_get_without_preload_content( + def index_yokogawa_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -316943,9 +318270,9 @@ def index_yamaha_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"yamaha\" + """Return vulnerability data stored in index \"yokogawa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yamaha Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yamaha?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yokogawa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yokogawa?cursor=` :param page: set the page number of the response :type page: int @@ -317017,7 +318344,7 @@ def index_yamaha_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yamaha_get_serialize( + _param = self._index_yokogawa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -317049,7 +318376,7 @@ def index_yamaha_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -317060,7 +318387,7 @@ def index_yamaha_get_without_preload_content( return response_data.response - def _index_yamaha_get_serialize( + def _index_yokogawa_get_serialize( self, page, limit, @@ -317228,7 +318555,7 @@ def _index_yamaha_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/yamaha', + resource_path='/v3/index/yokogawa', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -317245,7 +318572,7 @@ def _index_yamaha_get_serialize( @validate_call - def index_yokogawa_get( + def index_yubico_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -317283,10 +318610,10 @@ def index_yokogawa_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"yokogawa\" + ) -> RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination: + """Return vulnerability data stored in index \"yubico\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yokogawa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yokogawa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yubico Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yubico?cursor=` :param page: set the page number of the response :type page: int @@ -317358,7 +318685,7 @@ def index_yokogawa_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yokogawa_get_serialize( + _param = self._index_yubico_get_serialize( page=page, limit=limit, cursor=cursor, @@ -317390,7 +318717,7 @@ def index_yokogawa_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination", '404': "str", '500': "str", } @@ -317406,7 +318733,7 @@ def index_yokogawa_get( @validate_call - def index_yokogawa_get_with_http_info( + def index_yubico_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -317444,10 +318771,10 @@ def index_yokogawa_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"yokogawa\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination]: + """Return vulnerability data stored in index \"yubico\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yokogawa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yokogawa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yubico Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yubico?cursor=` :param page: set the page number of the response :type page: int @@ -317519,7 +318846,7 @@ def index_yokogawa_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yokogawa_get_serialize( + _param = self._index_yubico_get_serialize( page=page, limit=limit, cursor=cursor, @@ -317551,7 +318878,7 @@ def index_yokogawa_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination", '404': "str", '500': "str", } @@ -317567,7 +318894,7 @@ def index_yokogawa_get_with_http_info( @validate_call - def index_yokogawa_get_without_preload_content( + def index_yubico_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -317606,9 +318933,9 @@ def index_yokogawa_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"yokogawa\" + """Return vulnerability data stored in index \"yubico\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yokogawa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yokogawa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yubico Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yubico?cursor=` :param page: set the page number of the response :type page: int @@ -317680,7 +319007,7 @@ def index_yokogawa_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yokogawa_get_serialize( + _param = self._index_yubico_get_serialize( page=page, limit=limit, cursor=cursor, @@ -317712,7 +319039,7 @@ def index_yokogawa_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination", '404': "str", '500': "str", } @@ -317723,7 +319050,7 @@ def index_yokogawa_get_without_preload_content( return response_data.response - def _index_yokogawa_get_serialize( + def _index_yubico_get_serialize( self, page, limit, @@ -317891,7 +319218,7 @@ def _index_yokogawa_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/yokogawa', + resource_path='/v3/index/yubico', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -317908,7 +319235,7 @@ def _index_yokogawa_get_serialize( @validate_call - def index_yubico_get( + def index_zdi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -317946,10 +319273,10 @@ def index_yubico_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination: - """Return vulnerability data stored in index \"yubico\" + ) -> RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"zdi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yubico Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yubico?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zero Day Initiative Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zdi?cursor=` :param page: set the page number of the response :type page: int @@ -318021,7 +319348,7 @@ def index_yubico_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yubico_get_serialize( + _param = self._index_zdi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -318053,7 +319380,7 @@ def index_yubico_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -318069,7 +319396,7 @@ def index_yubico_get( @validate_call - def index_yubico_get_with_http_info( + def index_zdi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -318107,10 +319434,10 @@ def index_yubico_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination]: - """Return vulnerability data stored in index \"yubico\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"zdi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yubico Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yubico?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zero Day Initiative Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zdi?cursor=` :param page: set the page number of the response :type page: int @@ -318182,7 +319509,7 @@ def index_yubico_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yubico_get_serialize( + _param = self._index_zdi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -318214,7 +319541,7 @@ def index_yubico_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -318230,7 +319557,7 @@ def index_yubico_get_with_http_info( @validate_call - def index_yubico_get_without_preload_content( + def index_zdi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -318269,9 +319596,9 @@ def index_yubico_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"yubico\" + """Return vulnerability data stored in index \"zdi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Yubico Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/yubico?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zero Day Initiative Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zdi?cursor=` :param page: set the page number of the response :type page: int @@ -318343,7 +319670,7 @@ def index_yubico_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_yubico_get_serialize( + _param = self._index_zdi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -318375,7 +319702,7 @@ def index_yubico_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -318386,7 +319713,7 @@ def index_yubico_get_without_preload_content( return response_data.response - def _index_yubico_get_serialize( + def _index_zdi_get_serialize( self, page, limit, @@ -318554,7 +319881,7 @@ def _index_yubico_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/yubico', + resource_path='/v3/index/zdi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -318571,7 +319898,7 @@ def _index_yubico_get_serialize( @validate_call - def index_zdi_get( + def index_zebra_eol_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -318609,10 +319936,10 @@ def index_zdi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"zdi\" + ) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: + """Return vulnerability data stored in index \"zebra-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zero Day Initiative Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zdi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zebra-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zebra End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zebra-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zebra-eol?cursor=` :param page: set the page number of the response :type page: int @@ -318684,7 +320011,7 @@ def index_zdi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_zdi_get_serialize( + _param = self._index_zebra_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -318716,7 +320043,7 @@ def index_zdi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -318732,7 +320059,7 @@ def index_zdi_get( @validate_call - def index_zdi_get_with_http_info( + def index_zebra_eol_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -318770,10 +320097,10 @@ def index_zdi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"zdi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination]: + """Return vulnerability data stored in index \"zebra-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zero Day Initiative Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zdi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zebra-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zebra End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zebra-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zebra-eol?cursor=` :param page: set the page number of the response :type page: int @@ -318845,7 +320172,7 @@ def index_zdi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_zdi_get_serialize( + _param = self._index_zebra_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -318877,7 +320204,7 @@ def index_zdi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -318893,7 +320220,7 @@ def index_zdi_get_with_http_info( @validate_call - def index_zdi_get_without_preload_content( + def index_zebra_eol_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -318932,9 +320259,9 @@ def index_zdi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"zdi\" + """Return vulnerability data stored in index \"zebra-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zero Day Initiative Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zdi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the zebra-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Zebra End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/zebra-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/zebra-eol?cursor=` :param page: set the page number of the response :type page: int @@ -319006,7 +320333,7 @@ def index_zdi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_zdi_get_serialize( + _param = self._index_zebra_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -319038,7 +320365,7 @@ def index_zdi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -319049,7 +320376,7 @@ def index_zdi_get_without_preload_content( return response_data.response - def _index_zdi_get_serialize( + def _index_zebra_eol_get_serialize( self, page, limit, @@ -319217,7 +320544,7 @@ def _index_zdi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/zdi', + resource_path='/v3/index/zebra-eol', path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/vulncheck_sdk/api_client.py b/vulncheck_sdk/api_client.py index 42ef2fd3..52a5b7b0 100644 --- a/vulncheck_sdk/api_client.py +++ b/vulncheck_sdk/api_client.py @@ -92,7 +92,7 @@ def __init__( self.default_headers[header_name] = header_value self.cookie = cookie # Set default User-Agent. - self.user_agent = 'OpenAPI-Generator/0.0.44/python' + self.user_agent = 'OpenAPI-Generator/0.0.45/python' self.client_side_validation = configuration.client_side_validation def __enter__(self): diff --git a/vulncheck_sdk/configuration.py b/vulncheck_sdk/configuration.py index 520603f7..167b21b1 100644 --- a/vulncheck_sdk/configuration.py +++ b/vulncheck_sdk/configuration.py @@ -537,7 +537,7 @@ def to_debug_report(self) -> str: "OS: {env}\n"\ "Python Version: {pyversion}\n"\ "Version of the API: latest\n"\ - "SDK Package Version: 0.0.44".\ + "SDK Package Version: 0.0.45".\ format(env=sys.platform, pyversion=sys.version) def get_host_settings(self) -> List[HostSetting]: diff --git a/vulncheck_sdk/models/__init__.py b/vulncheck_sdk/models/__init__.py index 083a77f1..81dcb2b1 100644 --- a/vulncheck_sdk/models/__init__.py +++ b/vulncheck_sdk/models/__init__.py @@ -295,6 +295,11 @@ from vulncheck_sdk.models.advisory_gmo_cyber_security import AdvisoryGMOCyberSecurity from vulncheck_sdk.models.advisory_gallagher import AdvisoryGallagher from vulncheck_sdk.models.advisory_gen import AdvisoryGen +from vulncheck_sdk.models.advisory_generic_eol import AdvisoryGenericEOL +from vulncheck_sdk.models.advisory_generic_eol_core import AdvisoryGenericEOLCore +from vulncheck_sdk.models.advisory_generic_eol_product import AdvisoryGenericEOLProduct +from vulncheck_sdk.models.advisory_generic_eol_reference import AdvisoryGenericEOLReference +from vulncheck_sdk.models.advisory_generic_eolvc_info import AdvisoryGenericEOLVCInfo from vulncheck_sdk.models.advisory_genetec import AdvisoryGenetec from vulncheck_sdk.models.advisory_gigabyte import AdvisoryGigabyte from vulncheck_sdk.models.advisory_git_hub_exploit import AdvisoryGitHubExploit @@ -1032,6 +1037,7 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gallagher_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gen_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_genetec_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gigabyte_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination from vulncheck_sdk.models.render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination diff --git a/vulncheck_sdk/models/advisory_generic_eol.py b/vulncheck_sdk/models/advisory_generic_eol.py new file mode 100644 index 00000000..0b9e1760 --- /dev/null +++ b/vulncheck_sdk/models/advisory_generic_eol.py @@ -0,0 +1,104 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from vulncheck_sdk.models.advisory_generic_eol_core import AdvisoryGenericEOLCore +from vulncheck_sdk.models.advisory_generic_eol_product import AdvisoryGenericEOLProduct +from vulncheck_sdk.models.advisory_generic_eolvc_info import AdvisoryGenericEOLVCInfo +from typing import Optional, Set +from typing_extensions import Self + +class AdvisoryGenericEOL(BaseModel): + """ + advisory.GenericEOL + """ # noqa: E501 + core: Optional[AdvisoryGenericEOLCore] = None + product: Optional[AdvisoryGenericEOLProduct] = None + vc_info: Optional[AdvisoryGenericEOLVCInfo] = Field(default=None, alias="vcInfo") + __properties: ClassVar[List[str]] = ["core", "product", "vcInfo"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOL from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + # override the default output from pydantic by calling `to_dict()` of core + if self.core: + _dict['core'] = self.core.to_dict() + # override the default output from pydantic by calling `to_dict()` of product + if self.product: + _dict['product'] = self.product.to_dict() + # override the default output from pydantic by calling `to_dict()` of vc_info + if self.vc_info: + _dict['vcInfo'] = self.vc_info.to_dict() + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOL from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "core": AdvisoryGenericEOLCore.from_dict(obj["core"]) if obj.get("core") is not None else None, + "product": AdvisoryGenericEOLProduct.from_dict(obj["product"]) if obj.get("product") is not None else None, + "vcInfo": AdvisoryGenericEOLVCInfo.from_dict(obj["vcInfo"]) if obj.get("vcInfo") is not None else None + }) + return _obj + + diff --git a/vulncheck_sdk/models/advisory_generic_eol_core.py b/vulncheck_sdk/models/advisory_generic_eol_core.py new file mode 100644 index 00000000..f57276d3 --- /dev/null +++ b/vulncheck_sdk/models/advisory_generic_eol_core.py @@ -0,0 +1,94 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set +from typing_extensions import Self + +class AdvisoryGenericEOLCore(BaseModel): + """ + advisory.GenericEOLCore + """ # noqa: E501 + end_of_life: Optional[StrictStr] = None + end_of_sales: Optional[StrictStr] = None + end_of_security_support: Optional[StrictStr] = None + last_updated: Optional[StrictStr] = None + __properties: ClassVar[List[str]] = ["end_of_life", "end_of_sales", "end_of_security_support", "last_updated"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLCore from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLCore from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "end_of_life": obj.get("end_of_life"), + "end_of_sales": obj.get("end_of_sales"), + "end_of_security_support": obj.get("end_of_security_support"), + "last_updated": obj.get("last_updated") + }) + return _obj + + diff --git a/vulncheck_sdk/models/advisory_generic_eol_product.py b/vulncheck_sdk/models/advisory_generic_eol_product.py new file mode 100644 index 00000000..28c1ccd8 --- /dev/null +++ b/vulncheck_sdk/models/advisory_generic_eol_product.py @@ -0,0 +1,92 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set +from typing_extensions import Self + +class AdvisoryGenericEOLProduct(BaseModel): + """ + advisory.GenericEOLProduct + """ # noqa: E501 + product_name: Optional[StrictStr] = None + product_version: Optional[StrictStr] = None + vendor_name: Optional[StrictStr] = None + __properties: ClassVar[List[str]] = ["product_name", "product_version", "vendor_name"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLProduct from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLProduct from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "product_name": obj.get("product_name"), + "product_version": obj.get("product_version"), + "vendor_name": obj.get("vendor_name") + }) + return _obj + + diff --git a/vulncheck_sdk/models/advisory_generic_eol_reference.py b/vulncheck_sdk/models/advisory_generic_eol_reference.py new file mode 100644 index 00000000..e4d8c129 --- /dev/null +++ b/vulncheck_sdk/models/advisory_generic_eol_reference.py @@ -0,0 +1,90 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set +from typing_extensions import Self + +class AdvisoryGenericEOLReference(BaseModel): + """ + advisory.GenericEOLReference + """ # noqa: E501 + description: Optional[StrictStr] = None + url: Optional[StrictStr] = None + __properties: ClassVar[List[str]] = ["description", "url"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLReference from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLReference from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "description": obj.get("description"), + "url": obj.get("url") + }) + return _obj + + diff --git a/vulncheck_sdk/models/advisory_generic_eolvc_info.py b/vulncheck_sdk/models/advisory_generic_eolvc_info.py new file mode 100644 index 00000000..398fd7af --- /dev/null +++ b/vulncheck_sdk/models/advisory_generic_eolvc_info.py @@ -0,0 +1,110 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from vulncheck_sdk.models.advisory_generic_eol_product import AdvisoryGenericEOLProduct +from vulncheck_sdk.models.advisory_generic_eol_reference import AdvisoryGenericEOLReference +from typing import Optional, Set +from typing_extensions import Self + +class AdvisoryGenericEOLVCInfo(BaseModel): + """ + advisory.GenericEOLVCInfo + """ # noqa: E501 + cve: Optional[List[StrictStr]] = None + date_added: Optional[StrictStr] = None + references: Optional[List[AdvisoryGenericEOLReference]] = None + replacement: Optional[AdvisoryGenericEOLProduct] = None + updated_at: Optional[StrictStr] = None + version: Optional[StrictStr] = None + __properties: ClassVar[List[str]] = ["cve", "date_added", "references", "replacement", "updated_at", "version"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLVCInfo from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + # override the default output from pydantic by calling `to_dict()` of each item in references (list) + _items = [] + if self.references: + for _item_references in self.references: + if _item_references: + _items.append(_item_references.to_dict()) + _dict['references'] = _items + # override the default output from pydantic by calling `to_dict()` of replacement + if self.replacement: + _dict['replacement'] = self.replacement.to_dict() + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of AdvisoryGenericEOLVCInfo from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "cve": obj.get("cve"), + "date_added": obj.get("date_added"), + "references": [AdvisoryGenericEOLReference.from_dict(_item) for _item in obj["references"]] if obj.get("references") is not None else None, + "replacement": AdvisoryGenericEOLProduct.from_dict(obj["replacement"]) if obj.get("replacement") is not None else None, + "updated_at": obj.get("updated_at"), + "version": obj.get("version") + }) + return _obj + + diff --git a/vulncheck_sdk/models/advisory_j_frog.py b/vulncheck_sdk/models/advisory_j_frog.py index 397daaaa..bea56f57 100644 --- a/vulncheck_sdk/models/advisory_j_frog.py +++ b/vulncheck_sdk/models/advisory_j_frog.py @@ -34,9 +34,10 @@ class AdvisoryJFrog(BaseModel): product: Optional[StrictStr] = None severity: Optional[StrictStr] = None summary: Optional[StrictStr] = None + updated_at: Optional[StrictStr] = None url: Optional[StrictStr] = None versions: Optional[List[StrictStr]] = None - __properties: ClassVar[List[str]] = ["cpes", "cve", "date_added", "product", "severity", "summary", "url", "versions"] + __properties: ClassVar[List[str]] = ["cpes", "cve", "date_added", "product", "severity", "summary", "updated_at", "url", "versions"] model_config = ConfigDict( populate_by_name=True, @@ -102,6 +103,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "product": obj.get("product"), "severity": obj.get("severity"), "summary": obj.get("summary"), + "updated_at": obj.get("updated_at"), "url": obj.get("url"), "versions": obj.get("versions") }) diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_generic_eol_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_generic_eol_paginate_pagination.py new file mode 100644 index 00000000..6318733c --- /dev/null +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_generic_eol_paginate_pagination.py @@ -0,0 +1,104 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + +from pydantic import BaseModel, ConfigDict, Field, StrictFloat, StrictInt +from typing import Any, ClassVar, Dict, List, Optional, Union +from vulncheck_sdk.models.advisory_generic_eol import AdvisoryGenericEOL +from vulncheck_sdk.models.paginate_pagination import PaginatePagination +from typing import Optional, Set +from typing_extensions import Self + +class RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination(BaseModel): + """ + render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination + """ # noqa: E501 + benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") + meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") + data: Optional[List[AdvisoryGenericEOL]] = None + __properties: ClassVar[List[str]] = ["_benchmark", "_meta", "data"] + + model_config = ConfigDict( + populate_by_name=True, + validate_assignment=True, + protected_namespaces=(), + ) + + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.model_dump(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> Optional[Self]: + """Create an instance of RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self) -> Dict[str, Any]: + """Return the dictionary representation of the model using alias. + + This has the following differences from calling pydantic's + `self.model_dump(by_alias=True)`: + + * `None` is only added to the output dict for nullable fields that + were set at model initialization. Other fields with value `None` + are ignored. + """ + excluded_fields: Set[str] = set([ + ]) + + _dict = self.model_dump( + by_alias=True, + exclude=excluded_fields, + exclude_none=True, + ) + # override the default output from pydantic by calling `to_dict()` of meta + if self.meta: + _dict['_meta'] = self.meta.to_dict() + # override the default output from pydantic by calling `to_dict()` of each item in data (list) + _items = [] + if self.data: + for _item_data in self.data: + if _item_data: + _items.append(_item_data.to_dict()) + _dict['data'] = _items + return _dict + + @classmethod + def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: + """Create an instance of RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return cls.model_validate(obj) + + _obj = cls.model_validate({ + "_benchmark": obj.get("_benchmark"), + "_meta": PaginatePagination.from_dict(obj["_meta"]) if obj.get("_meta") is not None else None, + "data": [AdvisoryGenericEOL.from_dict(_item) for _item in obj["data"]] if obj.get("data") is not None else None + }) + return _obj + +